All, This may be useful to you -- it has really helped some of my very busy servers. Background: I run iptables on a number of Internet facing mail relays mostly running Red Hat Enterprise Linux v.3 (current kernel is 2.4.21). Some servers had issues running out of ip_conntrack slots and dropping packets. ip_conntrack is the connection tracking table for stateful connections -- the default timeout is 6 days. That can be adjusted in kernel 2.4.23 and above, but nothing less. Once you start seeing the wonderful message: "ip_conntrack: table full, dropping packet" in your logs and console, a reboot is in order to restore sane operation. While you can increase the ip_conntrack table size, it uses non-swappable RAM (on a system with 1GB or greater of RAM, the default size of 65536 will use about 20MB of RAM, and it's best to increment it in powers of 2). We just upgraded a couple affected servers to RH 4 and thus are now running on a 2.6.9 kernel which has a whole slew of different timeout values that can be adjusted, but also supports an enhancement that will make a lot of difference for us. The following rules tell iptables to accept but not create ip_conntrack table entries for localhost traffic: iptables -t raw -A PREROUTING -i lo -j NOTRACK iptables -A INPUT -i lo -j ACCEPT For our servers about a third of the ip_conntrack entries were source and dest 127.0.0.1 (very heavy and creative DNS usage). I don't know why anyone would want to track localhost connections, but that is the default. I thought I'd pass this along as a useful trick to decrease the load. Richard Wilson --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change you mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss