I thought I had this figured out and it was a switch issue. I was doing a backup of my main router so I fired up the SmartOS router and I had the same issue. After a bit of packet captures and head scratching I figured out the loop issue. I needed to turn off all the spoofing stuff on the WAN interface. Its not needed since that interface is just a DHCP client from my ISP. Now things are humming along nicely.
On Tue, Oct 31, 2017 at 3:14 PM, Greg Treantos <[email protected]> wrote: > Figured this out. It turned out to be an issue with one of my switches. > Turned off IGMP forwarding and the issue went away. I thought I this turned > off but obviously I didn't. > > On Sat, Oct 28, 2017 at 1:56 PM, Greg Treantos <[email protected]> wrote: > >> I figured out the update issue. needed to use vmadm udate <uuid> >> autoboot=false. It was in the man pages :-) >> >> On Sat, Oct 28, 2017 at 8:55 AM, Greg Treantos <[email protected]> >> wrote: >> >>> I decided to setup a couple of routers on my home SmartOS server. One is >>> the main house router and the other is a bridge router to my Verizon WAP. >>> The bridge is so I can get Verizon services like DVR control when I am away >>> from my house. This is well documented in the Verizon Forums. >>> >>> I have a single NIC that is VLAN'd via definitions for each VM. The >>> VLANs are 10 - for the Verizon FIOS connection, 100 - for the main home >>> LAN, 173 for the Fios connection between the bridge router and the Verizon >>> WAP, and 200 for an isolate guest lan. >>> >>> Router 1 is configured with 3 NICs, on vlans 10, 100, and 200. Router 2 >>> is configured with 2 nics on vlan 100, and 173. >>> >>> I also have another dedicated minipc that is running Fedora 26 with a >>> similar setup. The only difference is VLAN 10 had a dedicated NIC. Vlans >>> 100, 173, and 200 are bridged through the same NIC. >>> >>> On the KVM Fedora box everything run fine. IE I can run both routers >>> without an issue. On SmartOS I can run only one of the routers at a time. >>> If I run both a loop occurs and the system crashes. I know the VLANs are >>> set up in the switches properly since I can run Router 1 on Fedora and >>> Router 2 on SmartOS and it works. Or I can run Router 1 on SmartOS and >>> Router 2 on Fedora and that works. >>> >>> Any idea why I would have a loop in SmartOS? The network json's for each >>> KVM instance is below.. >>> >>> One more question. I am trying to set autoboot to false and I can't. I >>> use vmadm update <zoneid> autoboot:false and I get a confirmation that it >>> worked but the value stays true. How do I set this?? >>> >>> Router 1 >>> >>> "nics": [ >>> { >>> "interface": "net0", >>> "mac": "11:11:11:11:11:11", >>> "vlan_id": 10, >>> "nic_tag": "firewall", >>> "ip": "dhcp", >>> "ips": [ >>> "dhcp" >>> ], >>> "model": "virtio", >>> "allow_dhcp_spoofing": true, >>> "allow_ip_spoofing": true, >>> "allow_mac_spoofing": true, >>> "allow_restricted_traffic": true, >>> "allow_unfiltered_promisc": true, >>> "primary": true >>> }, >>> { >>> "interface": "net1", >>> "mac": "42:50:0e:e8:c7:28", >>> "vlan_id": 100, >>> "nic_tag": "firewall", >>> "netmask": "255.255.255.0", >>> "ip": "192.168.1.254", >>> "ips": [ >>> "192.168.1.254/24" >>> ], >>> "model": "virtio", >>> "allow_dhcp_spoofing": true, >>> "allow_ip_spoofing": true, >>> "allow_mac_spoofing": true, >>> "allow_restricted_traffic": true, >>> "allow_unfiltered_promisc": true >>> }, >>> { >>> "interface": "net2", >>> "mac": "f2:8d:d3:20:1c:20", >>> "vlan_id": 200, >>> "nic_tag": "firewall", >>> "netmask": "255.255.255.224", >>> "ip": "192.168.200.30", >>> "ips": [ >>> "192.168.200.30/27" >>> ], >>> "model": "virtio", >>> "allow_dhcp_spoofing": true, >>> "allow_ip_spoofing": true, >>> "allow_mac_spoofing": true, >>> "allow_restricted_traffic": true, >>> "allow_unfiltered_promisc": true >>> } >>> >>> Router 2 >>> >>> "nics": [ >>> { >>> "interface": "net0", >>> "mac": "d2:d3:ca:87:5d:a6", >>> "vlan_id": 100, >>> "nic_tag": "firewall", >>> "ip": "dhcp", >>> "ips": [ >>> "dhcp" >>> ], >>> "model": "virtio", >>> "allow_dhcp_spoofing": true, >>> "allow_ip_spoofing": true, >>> "allow_mac_spoofing": true, >>> "allow_restricted_traffic": true, >>> "allow_unfiltered_promisc": true, >>> "primary": true >>> }, >>> { >>> "interface": "net1", >>> "mac": "72:7c:9d:dd:6e:a3", >>> "vlan_id": 173, >>> "nic_tag": "firewall", >>> "netmask": "255.255.255.0", >>> "ip": "173.48.255.1", >>> "ips": [ >>> "173.48.255.1/24" >>> ], >>> "model": "virtio", >>> "allow_dhcp_spoofing": true, >>> "allow_ip_spoofing": true, >>> "allow_mac_spoofing": true, >>> "allow_restricted_traffic": true, >>> "allow_unfiltered_promisc": true >>> } >>> ], >>> >>> -- >>> Greg >>> >>> http://www.linkedin.com/in/gregtreantos >>> >> >> >> >> -- >> Greg >> >> http://www.linkedin.com/in/gregtreantos >> > > > > -- > Greg > > http://www.linkedin.com/in/gregtreantos > -- Greg http://www.linkedin.com/in/gregtreantos ------------------------------------------- smartos-discuss Archives: https://www.listbox.com/member/archive/184463/=now RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00 Modify Your Subscription: https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb Powered by Listbox: http://www.listbox.com
