da circa un mese noto tra i log questo errore:
Codice: Seleziona tutto
Mar 28 01:27:45 192.168.13.1 1573: 5d04h: %SYS-2-MALLOCFAIL: Memory
allocation of 10000 bytes failed from 0x804302EC, alignment 0
Mar 28 01:27:45 192.168.13.1 1574: Pool: Processor Free: 745024 Cause: Memory fragmentation
Mar 28 01:27:45 192.168.13.1 1575: Alternate Pool: None Free: 0 Cause: No Alternate pool
Mar 28 01:27:45 192.168.13.1 1576:
Mar 28 01:27:45 192.168.13.1 1577: -Process= "IP Input", ipl= 3, pid=45
Mar 28 01:27:45 192.168.13.1 1578: -Traceback= 80434F7C 80437028 804302F0 80B9556C 80B6B74C 80B6D2B4 80B72B94 80B6401C 80540CB0 8053F764 8053F974 8053FA28 8053FB7C 8045A65C 8045DD08
%% Low on memory; try again later
Il problema si "risolve" quando mi disconnetto da emule.
Questo è lo show version:
Codice: Seleziona tutto
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.3(12a), RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2005 by cisco Systems, Inc.
Compiled Thu 13-Jan-05 18:06 by kellythw
Image text-base: 0x80008098, data-base: 0x819FA39C
ROM: System Bootstrap, Version 12.2(6r), RELEASE SOFTWARE (fc1)
ROM: C2600 Software (C2600-IK9O3S3-M), Version 12.3(12a), RELEASE SOFTWARE
(fc2)
Gateway-Internet uptime is 6 days, 5 hours, 55 minutes
System returned to ROM by reload at 18:13:48 GDM Fri Apr 6 2007
System restarted at 18:16:30 GDM Fri Apr 6 2007
System image file is "flash:c2600-ik9o3s3-mz.123-12a"
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found
at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
[email protected].
cisco 2621 (MPC860) processor (revision 0x00) with 60416K/5120K bytes of
memory.
Processor board ID JAD06300HRQ (3707952919)
M860 processor: part number 0, mask 49
Bridging software.
X.25 software, Version 3.0.0.
Basic Rate ISDN software, Version 1.1.
2 FastEthernet/IEEE 802.3 interface(s)
2 Serial network interface(s)
4 ISDN Basic Rate interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read/Write)
Configuration register is 0x2102
Codice: Seleziona tutto
Current configuration : 14950 bytes
!
! Last configuration change at 18:14:51 GDM Thu Apr 12 2007
! NVRAM config last updated at 23:18:52 GDM Tue Apr 10 2007
!
version 12.3
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname Gateway-Internet
!
boot-start-marker
boot-end-marker
!
no logging console
enable password 7 XXXXXXXXXX
!
clock timezone GDM 1
no aaa new-model
ip subnet-zero
ip cef
!
!
ip name-server 192.168.13.34
!
ip inspect max-incomplete low 500
ip inspect max-incomplete high 600
ip inspect one-minute low 500
ip inspect one-minute high 1100
ip inspect udp idle-time 3600
ip inspect name Ethernet_0_0 tcp
ip inspect name Ethernet_0_0 udp
ip inspect name Ethernet_0_0 cuseeme
ip inspect name Ethernet_0_0 ftp
ip inspect name Ethernet_0_0 h323
ip inspect name Ethernet_0_0 rcmd
ip inspect name Ethernet_0_0 realaudio
ip inspect name Ethernet_0_0 smtp
ip inspect name Ethernet_0_0 streamworks
ip inspect name Ethernet_0_0 vdolive
ip inspect name Ethernet_0_0 sqlnet
ip inspect name Ethernet_0_0 tftp
ip inspect name Dialer_1 tcp
ip inspect name Dialer_1 smtp
ip inspect name Dialer_1 udp
ip inspect name Dialer_1 ftp
ip audit po max-events 100
ipv6 unicast-routing
ipv6 cef
!
isdn switch-type basic-net3
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface Loopback0
ip address 10.253.26.1 255.255.255.252
!
interface Tunnel0
description IPv6 uplink to SixXS
no ip address
ipv6 address 2001:1418:100:1D4::2/64
ipv6 enable
tunnel source FastEthernet0/1
tunnel destination 213.254.12.34
tunnel mode ipv6ip
!
interface Tunnel3
description BTexact Technologies tunnel broker (tb.ipv6.btexact.com)
no ip address
ipv6 address 2001:618:400::5058:AFE3/128
tunnel source FastEthernet0/1
tunnel destination 213.121.24.85
tunnel mode ipv6ip
!
interface Tunnel10
description IPv6 peering to AS41102
no ip address
ipv6 address 2001:1418:109:3::1/126
ipv6 enable
tunnel source FastEthernet0/1
tunnel destination 194.177.96.227
tunnel mode ipv6ip
!
interface Tunnel200
description SixXS IPv6 Tunnel to firewall-Test
no ip address
ipv6 address 2001:1418:109:10::1/64
ipv6 enable
tunnel source FastEthernet0/1
tunnel destination 10.1.2.1
tunnel mode ipv6ip
!
interface Tunnel300
no ip address
ipv6 address 2001:1418:109:20::1/120
ipv6 enable
tunnel source FastEthernet0/1
tunnel destination 192.168.14.34
tunnel mode ipv6ip
!
interface Tunnel400
description IPv6 SixXS to Server
no ip address
ipv6 address 2001:1418:109:1::1/120
ipv6 enable
tunnel source FastEthernet0/1
tunnel destination 192.168.13.34
tunnel mode ipv6ip
!
interface Tunnel1000
description connessione a Prova
no ip address
ipv6 address 2001:1418:109:21::1/120
tunnel source FastEthernet0/1
tunnel destination 172.16.22.2
tunnel mode ipv6ip
!
interface FastEthernet0/0
description connected to EthernetLAN
ip address 192.168.13.1 255.255.255.252
ip nat inside
ip inspect Ethernet_0_0 in
speed auto
full-duplex
ipv6 enable
no cdp enable
!
interface Serial0/0
description Connessione a Test_lan Seriale 0/0
ip address 172.16.20.1 255.255.255.252
ip nat inside
ipv6 enable
clockrate 4000000
!
interface FastEthernet0/1
description Connessione OCP wi-fi Internet
ip address 192.168.12.2 255.255.255.0
ip access-group 103 in
ip nat outside
ip inspect Ethernet_0_0 in
duplex auto
speed auto
ipv6 enable
no cdp enable
!
interface Serial0/1
description collegamento verso Prova
ip address 172.16.22.1 255.255.255.252
ip nat inside
clockrate 4000000
!
interface BRI1/0
description backup
no ip address
ip nat outside
ip inspect Dialer_1 in
encapsulation ppp
dialer rotary-group 1
dialer-group 1
isdn switch-type basic-net3
no cdp enable
!
interface BRI1/1
no ip address
shutdown
isdn switch-type basic-net3
!
interface BRI1/2
no ip address
shutdown
isdn switch-type basic-net3
!
interface BRI1/3
no ip address
shutdown
isdn switch-type basic-net3
!
interface Dialer1
description connected to Internet
bandwidth 64
ip address negotiated
ip access-group 103 in
ip nat outside
ip inspect Dialer_1 in
encapsulation ppp
no ip split-horizon
dialer in-band
dialer string 7020187187
dialer hold-queue 10
dialer-group 1
no cdp enable
ppp authentication chap
ppp chap hostname Telecom
ppp chap password 7 XXXXXXXXXX
ppp pap sent-username Telecom password 7 XXXXXXXXXX
!
router ospf 1
log-adjacency-changes
network 10.253.26.0 0.0.0.3 area 1
network 172.16.20.0 0.0.0.3 area 0
network 172.16.21.0 0.0.0.3 area 0
network 192.168.12.0 0.0.0.255 area 1
network 192.168.13.0 0.0.0.3 area 1
default-information originate
!
router bgp 65500
no synchronization
bgp router-id 192.168.12.2
bgp log-neighbor-changes
neighbor 2001:1418:109:3::2 remote-as 41102
neighbor 2001:1418:109:3::2 description test eBGP to AS41102
neighbor 2001:1418:109:3::2 update-source Tunnel10
no neighbor 2001:1418:109:3::2 activate
no auto-summary
!
address-family ipv6
neighbor 2001:1418:109:3::2 activate
neighbor 2001:1418:109:3::2 soft-reconfiguration inbound
network 2001:1418:109::/48
exit-address-family
!
ip nat translation timeout 300
ip nat translation tcp-timeout 180
ip nat translation udp-timeout 180
ip nat translation syn-timeout 120
ip nat translation icmp-timeout 120
ip nat inside source list 1 interface FastEthernet0/1 overload
ip nat inside source static tcp 192.168.13.45 80 interface FastEthernet0/1
80
ip nat inside source static tcp 192.168.14.45 25 interface FastEthernet0/1
25
ip nat inside source static tcp 192.168.13.34 40000 interface
FastEthernet0/1 40000
ip nat inside source static tcp 192.168.13.34 30000 interface
FastEthernet0/1 30000
ip nat inside source static tcp 10.1.1.100 4682 interface FastEthernet0/1
4682
ip nat inside source static udp 10.1.1.100 4692 interface FastEthernet0/1
4692
ip nat inside source static tcp 10.1.1.3 4662 interface FastEthernet0/1
4662
ip nat inside source static udp 10.1.1.3 4672 interface FastEthernet0/1
4672
ip nat inside source static tcp 192.168.13.34 22 interface FastEthernet0/1
22
ip nat inside source static tcp 192.168.14.45 443 interface
FastEthernet0/1 443
ip nat inside source static udp 192.168.13.34 1194 interface
FastEthernet0/1 1194
no ip http server
no ip http secure-server
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.12.1
!
ip ospf name-lookup
!
logging trap debugging
logging 192.168.13.2
access-list 1 permit 192.168.13.0 0.0.0.3
access-list 1 permit 192.168.14.0 0.0.0.3
access-list 1 permit 172.16.20.0 0.0.0.3
access-list 1 permit 172.16.21.0 0.0.0.3
access-list 1 permit 10.1.3.0 0.0.0.255
access-list 1 permit 10.1.2.0 0.0.0.255
access-list 1 permit 172.16.22.0 0.0.0.3
access-list 1 permit 192.168.14.32 0.0.0.21
access-list 1 permit 192.168.12.0 0.0.0.255
access-list 103 remark Nego classi riservate IANA 31/01/2007
access-list 103 deny ip host 0.0.0.0 any log
access-list 103 deny ip 1.0.0.0 0.255.255.255 any log
access-list 103 deny ip 2.0.0.0 0.255.255.255 any log
access-list 103 deny ip 5.0.0.0 0.255.255.255 any log
access-list 103 deny ip 7.0.0.0 0.255.255.255 any log
access-list 103 deny ip 10.0.0.0 0.255.255.255 any log
access-list 103 deny ip 23.0.0.0 0.255.255.255 any log
access-list 103 deny ip 27.0.0.0 0.255.255.255 any log
access-list 103 deny ip 31.0.0.0 0.255.255.255 any log
access-list 103 deny ip 36.0.0.0 0.255.255.255 any log
access-list 103 deny ip 37.0.0.0 0.255.255.255 any log
access-list 103 deny ip 39.0.0.0 0.255.255.255 any log
access-list 103 deny ip 42.0.0.0 0.255.255.255 any log
access-list 103 deny ip 92.0.0.0 0.255.255.255 any log
access-list 103 deny ip 93.0.0.0 0.255.255.255 any log
access-list 103 deny ip 94.0.0.0 0.255.255.255 any log
access-list 103 deny ip 95.0.0.0 0.255.255.255 any log
access-list 103 deny ip 100.0.0.0 0.255.255.255 any log
access-list 103 deny ip 101.0.0.0 0.255.255.255 any log
access-list 103 deny ip 102.0.0.0 0.255.255.255 any log
access-list 103 deny ip 103.0.0.0 0.255.255.255 any log
access-list 103 deny ip 104.0.0.0 0.255.255.255 any log
access-list 103 deny ip 105.0.0.0 0.255.255.255 any log
access-list 103 deny ip 106.0.0.0 0.255.255.255 any log
access-list 103 deny ip 107.0.0.0 0.255.255.255 any log
access-list 103 deny ip 108.0.0.0 0.255.255.255 any log
access-list 103 deny ip 109.0.0.0 0.255.255.255 any log
access-list 103 deny ip 110.0.0.0 0.255.255.255 any log
access-list 103 deny ip 111.0.0.0 0.255.255.255 any log
access-list 103 deny ip 112.0.0.0 0.255.255.255 any log
access-list 103 deny ip 113.0.0.0 0.255.255.255 any log
access-list 103 deny ip 114.0.0.0 0.255.255.255 any log
access-list 103 deny ip 115.0.0.0 0.255.255.255 any log
access-list 103 deny ip 116.0.0.0 0.255.255.255 any log
access-list 103 deny ip 117.0.0.0 0.255.255.255 any log
access-list 103 deny ip 118.0.0.0 0.255.255.255 any log
access-list 103 deny ip 119.0.0.0 0.255.255.255 any log
access-list 103 deny ip 120.0.0.0 0.255.255.255 any log
access-list 103 deny ip 127.0.0.0 0.255.255.255 any log
access-list 103 deny ip 169.254.0.0 0.0.255.255 any log
access-list 103 deny ip 172.16.0.0 0.15.255.255 any log
access-list 103 deny ip 173.0.0.0 0.255.255.255 any log
access-list 103 deny ip 174.0.0.0 0.255.255.255 any log
access-list 103 deny ip 175.0.0.0 0.255.255.255 any log
access-list 103 deny ip 176.0.0.0 0.255.255.255 any log
access-list 103 deny ip 177.0.0.0 0.255.255.255 any log
access-list 103 deny ip 178.0.0.0 0.255.255.255 any log
access-list 103 deny ip 179.0.0.0 0.255.255.255 any log
access-list 103 deny ip 180.0.0.0 0.255.255.255 any log
access-list 103 deny ip 181.0.0.0 0.255.255.255 any log
access-list 103 deny ip 182.0.0.0 0.255.255.255 any log
access-list 103 deny ip 183.0.0.0 0.255.255.255 any log
access-list 103 deny ip 184.0.0.0 0.255.255.255 any log
access-list 103 deny ip 185.0.0.0 0.255.255.255 any log
access-list 103 deny ip 186.0.0.0 0.255.255.255 any log
access-list 103 deny ip 187.0.0.0 0.255.255.255 any log
access-list 103 deny ip 197.0.0.0 0.255.255.255 any log
access-list 103 deny ip 223.0.0.0 0.255.255.255 any log
access-list 103 deny ip 224.0.0.0 0.255.255.255 any log
access-list 103 deny ip 225.0.0.0 0.255.255.255 any log
access-list 103 deny ip 226.0.0.0 0.255.255.255 any log
access-list 103 deny ip 227.0.0.0 0.255.255.255 any log
access-list 103 deny ip 228.0.0.0 0.255.255.255 any log
access-list 103 deny ip 229.0.0.0 0.255.255.255 any log
access-list 103 deny ip 230.0.0.0 0.255.255.255 any log
access-list 103 deny ip 231.0.0.0 0.255.255.255 any log
access-list 103 deny ip 232.0.0.0 0.255.255.255 any log
access-list 103 deny ip 233.0.0.0 0.255.255.255 any log
access-list 103 deny ip 234.0.0.0 0.255.255.255 any log
access-list 103 deny ip 235.0.0.0 0.255.255.255 any log
access-list 103 deny ip 236.0.0.0 0.255.255.255 any log
access-list 103 deny ip 237.0.0.0 0.255.255.255 any log
access-list 103 deny ip 238.0.0.0 0.255.255.255 any log
access-list 103 deny ip 239.0.0.0 0.255.255.255 any log
access-list 103 deny ip 240.0.0.0 0.255.255.255 any log
access-list 103 deny ip 241.0.0.0 0.255.255.255 any log
access-list 103 deny ip 242.0.0.0 0.255.255.255 any log
access-list 103 deny ip 243.0.0.0 0.255.255.255 any log
access-list 103 deny ip 244.0.0.0 0.255.255.255 any log
access-list 103 deny ip 245.0.0.0 0.255.255.255 any log
access-list 103 deny ip 246.0.0.0 0.255.255.255 any log
access-list 103 deny ip 247.0.0.0 0.255.255.255 any log
access-list 103 deny ip 248.0.0.0 0.255.255.255 any log
access-list 103 deny ip 249.0.0.0 0.255.255.255 any log
access-list 103 deny ip 250.0.0.0 0.255.255.255 any log
access-list 103 deny ip 251.0.0.0 0.255.255.255 any log
access-list 103 deny ip 252.0.0.0 0.255.255.255 any log
access-list 103 deny ip 253.0.0.0 0.255.255.255 any log
access-list 103 deny ip 254.0.0.0 0.255.255.255 any log
access-list 103 deny ip host 255.255.255.255 any log
access-list 103 remark Abilito protocollo ipv6
access-list 103 permit 41 any any
access-list 103 remark Accesso FTP
access-list 103 permit tcp any any eq ftp-data
access-list 103 permit tcp any any eq ftp log
access-list 103 remark Accesso SSH
access-list 103 permit tcp any any eq 22 log
access-list 103 remark Nego Telnet dall'esterno
access-list 103 deny tcp any any eq telnet log
access-list 103 remark Accesso SMTP
access-list 103 permit tcp any any eq smtp log
access-list 103 remark Accesso Domain
access-list 103 permit tcp any any eq domain log
access-list 103 permit tcp any eq domain any gt 1023
access-list 103 remark Accesso HTTP
access-list 103 permit tcp any any eq www log
access-list 103 remark Accesso POP3
access-list 103 permit tcp any any eq pop3 log
access-list 103 remark Accesso HTTPS
access-list 103 permit tcp any any eq 443 log
access-list 103 remark Accesso BNC
access-list 103 permit tcp any any eq 40000 log
access-list 103 remark psyBNC ax
access-list 103 permit tcp any any eq 30000 log
access-list 103 remark Accesso Emule
access-list 103 permit tcp any any eq 4662
access-list 103 permit udp any any eq 4672
access-list 103 permit tcp any any eq 4682
access-list 103 remark Consento connessioni "Iniziate"
access-list 103 permit tcp any any established
access-list 103 remark Inbound PING
access-list 103 permit icmp any any echo
access-list 103 remark Inbound PING response
access-list 103 permit icmp any any echo-reply
access-list 103 remark path MTU to function
access-list 103 permit icmp any any packet-too-big
access-list 103 remark Flow control
access-list 103 permit icmp any any source-quench
access-list 103 remark time exceeded messages for traceroute and loops
access-list 103 permit icmp any any time-exceeded
access-list 103 remark Block all other ICMP packets
access-list 104 permit ospf any any
access-list 104 permit ip any any
access-list 104 permit 41 any any
dialer-list 1 protocol ip permit
ipv6 route 2001:1418:109:1::/120 Tunnel0
ipv6 route 2001:1418:109:10::/64 Tunnel0
ipv6 route 2001:1418:109:20::/120 Tunnel0
ipv6 route 2000::/3 2001:1418:100:1D4::1
!
snmp-server community public RO
snmp-server enable traps snmp authentication linkdown linkup coldstart
warmstart
snmp-server enable traps syslog
snmp-server enable traps dial
!
ipv6 access-list fw-out
permit ipv6 any any
!
ipv6 access-list fw-in
permit tcp any any established
permit tcp any any eq domain
permit udp any any eq domain
permit tcp any any eq www
permit tcp any any eq ident
permit tcp any any range 6667 7000
permit icmp any any echo-request
permit icmp any any echo-reply
permit icmp any any packet-too-big
permit icmp any any time-exceeded
permit icmp any any unreachable
deny ipv6 any any log
!
!
!
!
!
line con 0
exec-timeout 0 0
password 7 XXXXXXXXXX
login
line aux 0
line vty 0 4
password 7 XXXXXXXXXX
login
!
ntp clock-period 17180492
ntp source FastEthernet0/0
ntp server 192.168.13.34
!
end
Secondo voi, è un problema hardware, oppure la mia config non corretta?
Grazie mille