竟然查不到neighbor table full的消息

Aug 18 16:10:33 fc3 kernel: printk: 2 messages suppressed.
Aug 18 16:13:44 fc3 kernel: printk: 1 messages suppressed.
Aug 18 17:35:53 fc3 kernel: dst cache overflow
Aug 18 17:43:49 fc3 last message repeated 7 times
Aug 18 17:43:56 fc3 last message repeated 10 times
Aug 18 17:44:02 fc3 kernel: printk: 12 messages suppressed.
Aug 18 17:44:02 fc3 kernel: dst cache overflow
Aug 18 17:44:04 fc3 kernel: printk: 14 messages suppressed.
Aug 18 17:44:04 fc3 kernel: dst cache overflow
Aug 18 17:44:09 fc3 kernel: printk: 13 messages suppressed.
Aug 18 17:44:09 fc3 kernel: dst cache overflow
Aug 18 17:44:16 fc3 kernel: printk: 31 messages suppressed.
Aug 18 17:44:16 fc3 kernel: dst cache overflow
Aug 18 17:45:28 fc3 kernel: printk: 15 messages suppressed
再后来就
Aug 18 20:45:32 fc3 kernel: dst cache overflow
Aug 18 20:45:37 fc3 kernel: printk: 367 messages suppressed.
Aug 18 20:45:37 fc3 kernel: dst cache overflow
Aug 18 20:45:42 fc3 kernel: printk: 298 messages suppressed.
Aug 18 20:45:42 fc3 kernel: dst cache overflow
Aug 18 20:45:47 fc3 kernel: printk: 280 messages suppressed.
Aug 18 20:45:47 fc3 kernel: dst cache overflow
Aug 18 20:45:52 fc3 kernel: printk: 239 messages suppressed.
Aug 18 20:45:52 fc3 kernel: dst cache overflow
Aug 18 20:45:57 fc3 kernel: printk: 322 messages suppressed.
Aug 18 20:45:57 fc3 kernel: dst cache overflow
其实查日志8.1左右就出现了dst cache overflow,这是什么东东???
再看CU的帖,
有人说改了这,好了几分钟,
默认大小
echo 120 >; /proc/sys/net/ipv4/neigh/default/gc_stale_time 60
echo 512 >; /proc/sys/net/ipv4/neigh/default/gc_thresh1 256
echo 2048 >; /proc/sys/net/ipv4/neigh/default/gc_thresh2 512
echo 4096 >; /proc/sys/net/ipv4/neigh/default/gc_thresh3 1024 ”
又说,对内网接口eth1进行跟踪:
# tcpdump -i eth1 arp
发现十几台机器不停地向linux询问不存在的ip地址的MAC,是它们造成arp表出现严重的抖动现象。
12:55:41.900194 arp who-has 172.19.0.157 tell 172.19.201.70
12:55:42.086023 arp who-has 172.19.215.219 tell 172.19.201.70
12:55:42.556482 arp who-has 172.19.124.232 tell 172.19.201.70
12:55:42.990155 arp who-has 172.19.85.122 tell 172.19.201.70
12:55:43.322160 arp who-has 172.19.88.217 tell 172.19.201.70
12:55:43.580866 arp who-has 172.19.51.85 tell 172.19.201.70
在天网防火墙中同时发现这十几台电脑不停在向外发包,主要是445端口,这些电脑有病毒。
我和网管停了这十几台电脑,“Neighbour table overflow”的信息终于消失。
我再来看我的,原来外网网卡是设的255.0.0.0的掩码,

也抓包看看
tcpdump -n -i eth0 arp
不得了,
[root@fc3 ~]# tcpdump -n -i eth0 arp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
00:56:16.247417 arp who-has 55.97.43.108 tell 55.66.66.6
00:56:16.336311 arp who-has 55.137.139.164 tell 55.66.66.6
00:56:16.370306 arp who-has 55.27.144.187 tell 55.66.66.6
00:56:16.409293 arp who-has 55.74.41.47 tell 55.66.66.6
00:56:16.409336 arp who-has 55.51.146.120 tell 55.66.66.6
原来这包是我发的?被黑了?
再看看内网网卡,
[root@fc3 ~]# tcpdump -n -i eth1 arp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
00:57:56.058315 arp who-has 192.168.0.223 tell 192.168.0.50
00:57:56.120764 arp who-has 192.168.0.187 tell 192.168.0.50
00:57:56.216952 arp who-has 192.168.0.182 tell 192.168.0.50
00:57:56.459455 arp who-has 192.168.0.160 tell 192.168.0.50
00:57:56.756649 arp who-has 192.168.0.158 tell 192.168.0.50
00:57:56.961031 arp who-has 192.168.0.170 tell 192.168.0.50
00:57:57.000000 arp who-has 192.168.0.123 tell 192.168.0.254
00:57:57.000263 arp reply 192.168.0.123 is-at 00:14:2a:23:be:bf
00:57:57.145870 arp who-has 192.168.0.126 tell 192.168.0.50
00:57:57.260960 arp who-has 192.168.0.107 tell 192.168.0.254
00:57:57.261238 arp reply 192.168.0.107 is-at 00:0d:87:49:e0:a4
00:57:57.408693 arp who-has 192.168.0.218 tell 192.168.0.50
原来192.168.0.50不对头,再看看在ip_conntrack中是怎么样的,
[root@fc3 ~]# cat /proc/net/ip_conntrack|grep 192.168.0.50|wc -l
701
[root@fc3 ~]# cat /proc/net/ip_conntrack
tcp 6 42 SYN_SENT src=192.168.0.50 dst=55.34.170.37 sport=3314 dport=445 packets=2 bytes=128 [UNREPLIED] src=55.34.170.37 dst=55.66.66.6 sport=445 dport=3314 packets=0 bytes=0 use=1
tcp 6 28 SYN_SENT src=192.168.0.50 dst=55.43.157.185 sport=3036 dport=445 packets=2 bytes=128 [UNREPLIED] src=55.43.157.185 dst=55.66.66.6 sport=445 dport=3036 packets=0 bytes=0 use=1
tcp 6 41 SYN_SENT src=192.168.0.50 dst=55.25.136.167 sport=3279 dport=445 packets=2 bytes=128 [UNREPLIED] src=55.25.136.167 dst=55.66.66.6 sport=445 dport=3279 packets=0 bytes=0 use=1
tcp 6 63 SYN_SENT src=192.168.0.50 dst=55.80.235.244 sport=3701 dport=445 packets=2 bytes=128 [UNREPLIED] src=55.80.235.244 dst=55.66.66.6 sport=445 dport=3701 packets=0 bytes=0 use=1
原来是中了病毒.
iptables -A FORWARD -i eth1 -p tcp --dport 445 -j DROP
这样就好了,arp正常了.
倒,这次怎么忘了封445了((((((((((((((((((