On Tue, Apr 26, 2016 at 7:38 AM, Olivier Mascia <[email protected]> wrote: >> Le 26 avr. 2016 à 00:37, Olivier Mascia <[email protected]> a écrit : >> >> It looks like as soon as I bring IPv6 to the party, my secondary starts >> thinking it's MASTER instead of BACKUP. Sometimes on the WAN side, sometimes >> on the LAN, sometimes both. Quite hard to describe, I'm still trying to >> build up a reproducible test case on my 2.3 cluster. So out of the blue, >> are there known-bugs or other kind of difficulties in having H.A. along with >> IPv4 and IPv6? > > This stabilized after reboots. >
My first guess at that issue would have been putting IPv6 IP aliases on an IPv4 CARP parent or vice versa. Input validation didn't prevent that until I added it a few days ago for 2.3.1+. But I don't think that would have changed after reboot. That symptom usually means ifconfig fails to add the IP on one or the other for some reason, generally always with IP aliases on CARP parent. Outside that circumstance, there aren't any caveats to having both IPv4 and IPv6 CARP, we do it on all our systems internally and have for over 5 years, and countless others do the same. > Sure, I'm not helped by the transit provider which does not actually route > the /56 prefix to my link (savages!) but merely 'switch' it to me, expecting > ARP/NDP from > each of my connected devices, and me using one dedicated IP of the block as > gateway. That's a mess, make them fix that. It's ugly at a minimum, and will make many typical uses of IPv6 impossible. No competent ISP will assign your /56 directly to their router in its entirety. > Until I thought of the RA!! I have set RA on WAN to Router Only over my > defined WAN IPv6 CARP You don't want RAs enabled on WAN. Your ISP's router is the one sending RAs in that case (if anything is). You're advertising yourself on that network as a router for other hosts, which is never what you want on your WAN. _______________________________________________ pfSense mailing list https://lists.pfsense.org/mailman/listinfo/list Support the project with Gold! https://pfsense.org/gold
