I thought I had this figured out and it was a switch issue. I was doing a
backup of my main router so I fired up the SmartOS router and I had the
same issue. After a bit of packet captures and head scratching I figured
out the loop issue. I needed to turn off all the spoofing stuff on the WAN
interface. Its not needed since that interface is just a DHCP client from
my ISP. Now things are humming along nicely.

On Tue, Oct 31, 2017 at 3:14 PM, Greg Treantos <[email protected]> wrote:

> Figured this out. It turned out to be an issue with one of my switches.
> Turned off IGMP forwarding and the issue went away. I thought I this turned
> off but obviously I didn't.
>
> On Sat, Oct 28, 2017 at 1:56 PM, Greg Treantos <[email protected]> wrote:
>
>> I figured out the update issue. needed to use vmadm udate <uuid>
>> autoboot=false. It was in the man pages :-)
>>
>> On Sat, Oct 28, 2017 at 8:55 AM, Greg Treantos <[email protected]>
>> wrote:
>>
>>> I decided to setup a couple of routers on my home SmartOS server. One is
>>> the main house router and the other is a bridge router to my Verizon WAP.
>>> The bridge is so I can get Verizon services like DVR control when I am away
>>> from my house. This is well documented in the Verizon Forums.
>>>
>>> I have a single NIC that is VLAN'd via definitions for each VM. The
>>> VLANs are 10 -  for the Verizon FIOS connection, 100 - for the main home
>>> LAN, 173 for the Fios connection between the bridge router and the Verizon
>>> WAP, and 200 for an isolate guest lan.
>>>
>>> Router 1 is configured with 3 NICs, on vlans 10, 100, and 200. Router 2
>>> is configured with 2 nics on vlan 100, and 173.
>>>
>>> I also have another dedicated minipc that is running Fedora 26 with a
>>> similar setup. The only difference is VLAN 10 had a dedicated NIC. Vlans
>>> 100, 173, and 200 are bridged through the same NIC.
>>>
>>> On the KVM Fedora box everything run fine. IE I can run both routers
>>> without an issue. On SmartOS I can run only one of the routers at a time.
>>> If I run both a loop occurs and the system crashes. I know the VLANs are
>>> set up in the switches properly since I can run Router 1 on Fedora and
>>> Router 2 on SmartOS and it works. Or I can run Router 1 on SmartOS and
>>> Router 2 on Fedora and that works.
>>>
>>> Any idea why I would have a loop in SmartOS? The network json's for each
>>> KVM instance is below..
>>>
>>> One more question. I am trying to set autoboot to false and I can't. I
>>> use vmadm update <zoneid> autoboot:false and I get a confirmation that it
>>> worked but the value stays true. How do I set this??
>>>
>>> Router 1
>>>
>>> "nics": [
>>>     {
>>>       "interface": "net0",
>>>       "mac": "11:11:11:11:11:11",
>>>       "vlan_id": 10,
>>>       "nic_tag": "firewall",
>>>       "ip": "dhcp",
>>>       "ips": [
>>>         "dhcp"
>>>       ],
>>>       "model": "virtio",
>>>       "allow_dhcp_spoofing": true,
>>>       "allow_ip_spoofing": true,
>>>       "allow_mac_spoofing": true,
>>>       "allow_restricted_traffic": true,
>>>       "allow_unfiltered_promisc": true,
>>>       "primary": true
>>>     },
>>>     {
>>>       "interface": "net1",
>>>       "mac": "42:50:0e:e8:c7:28",
>>>       "vlan_id": 100,
>>>       "nic_tag": "firewall",
>>>       "netmask": "255.255.255.0",
>>>       "ip": "192.168.1.254",
>>>       "ips": [
>>>         "192.168.1.254/24"
>>>       ],
>>>       "model": "virtio",
>>>       "allow_dhcp_spoofing": true,
>>>       "allow_ip_spoofing": true,
>>>       "allow_mac_spoofing": true,
>>>       "allow_restricted_traffic": true,
>>>       "allow_unfiltered_promisc": true
>>>     },
>>>     {
>>>       "interface": "net2",
>>>       "mac": "f2:8d:d3:20:1c:20",
>>>       "vlan_id": 200,
>>>       "nic_tag": "firewall",
>>>       "netmask": "255.255.255.224",
>>>       "ip": "192.168.200.30",
>>>       "ips": [
>>>         "192.168.200.30/27"
>>>       ],
>>>       "model": "virtio",
>>>       "allow_dhcp_spoofing": true,
>>>       "allow_ip_spoofing": true,
>>>       "allow_mac_spoofing": true,
>>>       "allow_restricted_traffic": true,
>>>       "allow_unfiltered_promisc": true
>>>     }
>>>
>>> Router 2
>>>
>>> "nics": [
>>>     {
>>>       "interface": "net0",
>>>       "mac": "d2:d3:ca:87:5d:a6",
>>>       "vlan_id": 100,
>>>       "nic_tag": "firewall",
>>>       "ip": "dhcp",
>>>       "ips": [
>>>         "dhcp"
>>>       ],
>>>       "model": "virtio",
>>>       "allow_dhcp_spoofing": true,
>>>       "allow_ip_spoofing": true,
>>>       "allow_mac_spoofing": true,
>>>       "allow_restricted_traffic": true,
>>>       "allow_unfiltered_promisc": true,
>>>       "primary": true
>>>     },
>>>     {
>>>       "interface": "net1",
>>>       "mac": "72:7c:9d:dd:6e:a3",
>>>       "vlan_id": 173,
>>>       "nic_tag": "firewall",
>>>       "netmask": "255.255.255.0",
>>>       "ip": "173.48.255.1",
>>>       "ips": [
>>>         "173.48.255.1/24"
>>>       ],
>>>       "model": "virtio",
>>>       "allow_dhcp_spoofing": true,
>>>       "allow_ip_spoofing": true,
>>>       "allow_mac_spoofing": true,
>>>       "allow_restricted_traffic": true,
>>>       "allow_unfiltered_promisc": true
>>>     }
>>>   ],
>>>
>>> --
>>> Greg
>>>
>>> http://www.linkedin.com/in/gregtreantos
>>>
>>
>>
>>
>> --
>> Greg
>>
>> http://www.linkedin.com/in/gregtreantos
>>
>
>
>
> --
> Greg
>
> http://www.linkedin.com/in/gregtreantos
>



-- 
Greg

http://www.linkedin.com/in/gregtreantos



-------------------------------------------
smartos-discuss
Archives: https://www.listbox.com/member/archive/184463/=now
RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb
Powered by Listbox: http://www.listbox.com

Reply via email to