You probably need to allow IP or Mac spoofing by the zone in question. See the relevant properties in vmadm manpage
On 28 Jan. 2018 12:26, "H. William Welliver III" <[email protected]> wrote: > Just a further clarification: things work against physical nics in the > global zone but not against a vnic; I’ve verified that all of the > protections are disabled on the vnic but to no avail. > > > On Jan 27, 2018, at 7:31 PM, H. William Welliver III < > [email protected]> wrote: > > > > Just a follow-up; I’ve tried softether in a zone running ubuntu as well > as a kvm zone running ubuntu, and neither works properly (the client is > able to connect but no traffic leaves the zone. > > > > I was able to run and use softether successfully from the global zone, > so this leads me to believe that there’s some sort of restriction when > running within a non-global zone, despite having given the nic in the zone > full spoofing privileges. > > > > Can anyone think of a reason this shouldn’t work (or something I might > be missing)? > > > > Best, > > > > Bill > > > >> On Jan 10, 2018, at 8:31 PM, H. William Welliver III < > [email protected]> wrote: > >> > >> Good evening, all: > >> > >> I have a physical server running the SoftEther VPN as a remote access > device, and I’ve been trying to migrate it onto a zone without much > success. I was wondering if anyone has had any luck using it. I’ve found a > little material online suggesting that it’s possible, but I’ve not had any > luck. Everything seems to work on the client <-> soft ether side, but it > seems that outbound packets onto the destination network don’t ever make it > anywhere (according to snoop). > >> > >> My first indication of a problem was when the tunnel wasn’t able to get > a DHCP address from the local DHCP server. My working assumption is that it > has something to do with one of the spoofing options, but I’ve not found a > combination that seems to improve the situation. > >> > >> I’ve also noticed that I’m not able to set the allow_unfiltered_promisc > option using "vmadm update" , despite being able to set the other spoofing > options. Is it possible that this is part of the problem? > >> > >> I’m pretty much stumped at this point. Technically this is an SDC > install, but it doesn’t seem like that is part of the equation here. I’m > running the latest SmartOS update. Any thoughts? > >> > >> Best, > >> > >> Bill > > > > > > ------------------------------------------- smartos-discuss Archives: https://www.listbox.com/member/archive/184463/=now RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00 Modify Your Subscription: https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb Powered by Listbox: http://www.listbox.com
