I decided to setup a couple of routers on my home SmartOS server. One is
the main house router and the other is a bridge router to my Verizon WAP.
The bridge is so I can get Verizon services like DVR control when I am away
from my house. This is well documented in the Verizon Forums.
I have a single NIC that is VLAN'd via definitions for each VM. The VLANs
are 10 - for the Verizon FIOS connection, 100 - for the main home LAN, 173
for the Fios connection between the bridge router and the Verizon WAP, and
200 for an isolate guest lan.
Router 1 is configured with 3 NICs, on vlans 10, 100, and 200. Router 2 is
configured with 2 nics on vlan 100, and 173.
I also have another dedicated minipc that is running Fedora 26 with a
similar setup. The only difference is VLAN 10 had a dedicated NIC. Vlans
100, 173, and 200 are bridged through the same NIC.
On the KVM Fedora box everything run fine. IE I can run both routers
without an issue. On SmartOS I can run only one of the routers at a time.
If I run both a loop occurs and the system crashes. I know the VLANs are
set up in the switches properly since I can run Router 1 on Fedora and
Router 2 on SmartOS and it works. Or I can run Router 1 on SmartOS and
Router 2 on Fedora and that works.
Any idea why I would have a loop in SmartOS? The network json's for each
KVM instance is below..
One more question. I am trying to set autoboot to false and I can't. I use
vmadm update <zoneid> autoboot:false and I get a confirmation that it
worked but the value stays true. How do I set this??
Router 1
"nics": [
{
"interface": "net0",
"mac": "11:11:11:11:11:11",
"vlan_id": 10,
"nic_tag": "firewall",
"ip": "dhcp",
"ips": [
"dhcp"
],
"model": "virtio",
"allow_dhcp_spoofing": true,
"allow_ip_spoofing": true,
"allow_mac_spoofing": true,
"allow_restricted_traffic": true,
"allow_unfiltered_promisc": true,
"primary": true
},
{
"interface": "net1",
"mac": "42:50:0e:e8:c7:28",
"vlan_id": 100,
"nic_tag": "firewall",
"netmask": "255.255.255.0",
"ip": "192.168.1.254",
"ips": [
"192.168.1.254/24"
],
"model": "virtio",
"allow_dhcp_spoofing": true,
"allow_ip_spoofing": true,
"allow_mac_spoofing": true,
"allow_restricted_traffic": true,
"allow_unfiltered_promisc": true
},
{
"interface": "net2",
"mac": "f2:8d:d3:20:1c:20",
"vlan_id": 200,
"nic_tag": "firewall",
"netmask": "255.255.255.224",
"ip": "192.168.200.30",
"ips": [
"192.168.200.30/27"
],
"model": "virtio",
"allow_dhcp_spoofing": true,
"allow_ip_spoofing": true,
"allow_mac_spoofing": true,
"allow_restricted_traffic": true,
"allow_unfiltered_promisc": true
}
Router 2
"nics": [
{
"interface": "net0",
"mac": "d2:d3:ca:87:5d:a6",
"vlan_id": 100,
"nic_tag": "firewall",
"ip": "dhcp",
"ips": [
"dhcp"
],
"model": "virtio",
"allow_dhcp_spoofing": true,
"allow_ip_spoofing": true,
"allow_mac_spoofing": true,
"allow_restricted_traffic": true,
"allow_unfiltered_promisc": true,
"primary": true
},
{
"interface": "net1",
"mac": "72:7c:9d:dd:6e:a3",
"vlan_id": 173,
"nic_tag": "firewall",
"netmask": "255.255.255.0",
"ip": "173.48.255.1",
"ips": [
"173.48.255.1/24"
],
"model": "virtio",
"allow_dhcp_spoofing": true,
"allow_ip_spoofing": true,
"allow_mac_spoofing": true,
"allow_restricted_traffic": true,
"allow_unfiltered_promisc": true
}
],
--
Greg
http://www.linkedin.com/in/gregtreantos
-------------------------------------------
smartos-discuss
Archives: https://www.listbox.com/member/archive/184463/=now
RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00
Modify Your Subscription:
https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb
Powered by Listbox: http://www.listbox.com