And so and so. This happens a couple of times a week and then disappears by itself.Are you doing this as root? Firewall blocking outgoing traffic?
Yes, you seem to be flooding your NAT state tables with NMap requests. This begs the question though, why are you NAT'ing traffic destined for RFC-1918 addresses?
ARP requests are broadcasts, they're not supposed to be routed and should stay inside the broadcast domain. So NAT shouldn't even be involved here.
I get these too, if my ISP has network issues. Slow internet often causes users to constantly F5 (refresh) webpages, causing even more traffic, which slow things down even more (and eventually overflow the NAT state tables).And very big time of ping:
Thanks.I use tsharkSome passive monitoring tool, yaf, ntop, etc. might give you a lot of enlightenment - but while they compactly capture data - they may not be the most trivial to understand after you collect the data.
Capturing PCAPs will definitely have all the information at a very high storage cost. You can do things like create rolling PCAPs that get truncated off over time and link that to flow records captured by something like yaf. (There's some information on that at http://tools.netsa.cert.org - full disclosure, I'm part of CERT.) But that's a bunch of work to setup and operate. Might not be worth the investment for you.
But I would agree that nmap is definitely the wrong tool here. And a network diagram would be really helpful if you want help.
It is not clear to me what kind of buffer this is, for example, to change its size.The problem I understand is multisystem
TheWhat can I do?Code:nmap -Pn 10.44.1.1-250 WARNING: eth_send of ARP packet returned -1 rather than expected 42 (errno=no buffer space available)
-Pn
switch to nmap(1) "Treat(s) all hosts as online -- skip(s) host discovery". So the machine running this command will just blindly try to scan every one of the 250 IP addresses you've specified, regardless of whether there's a host at that address or not. Let me guess, you're also running this in a tight loop? No wonder whatever poor machine you're running this on is running out of ARP buffer space. You're making thousands of useless ARP broadcasts.No, nmap -sT 10.44.1.1-255 gave the same result and then, I did not ask to scan an infinite number of hosts, but only 255.Not enough buffer for 255 hosts this can't beThe-Pn
switch to nmap(1) "Treat(s) all hosts as online -- skip(s) host discovery". So the machine running this command will just blindly try to scan every one of the 250 IP addresses you've specified, regardless of whether there's a host at that address or not. Let me guess, you're also running this in a tight loop? No wonder whatever poor machine you're running this on is running out of ARP buffer space. You're making thousands of useless ARP broadcasts.