Hi Joe,

I'm not sure which version you are upgrading to but since you mentioned 
xorpsh, I am assuming VC3?

If so, the issue is probably the : and "" on the firewall port-number 
and port-name nodes.  If you edit your config.boot file and remove the : 
and "" from the port-name and port-number settings in the firewall 
portion of your config, you should be able to load the config in the new 
version.

See the following Bugzilla reports for more information:

https://bugzilla.vyatta.com/show_bug.cgi?id=2573

https://bugzilla.vyatta.com/show_bug.cgi?id=2637

Thank you,

Robyn

Joe Pub wrote:
> Hi All,
>
> I have recently done a live upgrade of vyatta to make sure everything
> was up to date.  I saved the config.boot file just in case.  After the
> reboot the loaded config was lost (not sure if this is by design on an
> upgrade).  So I am now trying to load the config file from the ofr
> over tftp.
>
> Now the first problem was this, it failed to parse the config file on
> a firewall rule (which worked before the upgrade)
>
> which was this.
>
>         rule 9 {
>             protocol: "tcp"
>             action: "accept"
>             log: "disable"
>             destination {
>                 address: 192.168.10.2
>                 port-number: 1723
>             }
>         }
>
> it was complaining about the port number.  So I removed this rule out
> of the config file and tried to reaload it with this version.
>
> protocols {
>     ospf4 {
>         router-id: 10.1.1.3
>         rfc1583-compatibility: false
>         ip-router-alert: false
>         area 0.0.0.0 {
>             area-type: "normal"
>             interface eth0 {
>                 link-type: "broadcast"
>                 address 172.20.1.253 {
>                     priority: 128
>                     hello-interval: 10
>                     router-dead-interval: 40
>                     interface-cost: 1
>                     retransmit-interval: 5
>                     transit-delay: 1
>                     passive: false
>                     disable: false
>                 }
>             }
>             interface lo {
>                 link-type: "broadcast"
>                 address 10.1.1.3 {
>                     priority: 128
>                     hello-interval: 10
>                     router-dead-interval: 40
>                     interface-cost: 1
>                     retransmit-interval: 5
>                     transit-delay: 1
>                     passive: false
>                     disable: false
>                 }
>             }
>         }
>         export: "static-to-OSPF"
>     }
>     static {
>         disable: false
>         route 0.0.0.0/0 {
>             next-hop: x.x.x.30
>             metric: 1
>         }
>     }
> }
> policy {
>     policy-statement "static-to-OSPF" {
>         term 1 {
>             from {
>                 protocol: "static"
>             }
>             then {
>                 action: "accept"
>             }
>         }
>     }
> }
> interfaces {
>     restore: false
>     loopback lo {
>         description: ""
>         address 10.1.1.3 {
>             prefix-length: 32
>             disable: false
>         }
>     }
>     ethernet eth1 {
>         disable: false
>         discard: false
>         description: ""
>         hw-id: 00:50:56:a8:29:60
>         duplex: "auto"
>         speed: "auto"
>         address x.x.x.29 {
>             prefix-length: 27
>             disable: false
>         }
>         address x.x.x.3 {
>             prefix-length: 27
>             disable: false
>         }
>         address x.x.x.2 {
>             prefix-length: 27
>             disable: false
>         }
>         firewall {
>             in {
>                 name: "DMZ_IN"
>             }
>         }
>     }
>     ethernet eth0 {
>         disable: false
>         discard: false
>         description: ""
>         hw-id: 00:50:56:a8:34:ec
>         duplex: "auto"
>         speed: "auto"
>         address 172.20.1.253 {
>             prefix-length: 23
>             disable: false
>         }
>         vrrp {
>             vrrp-group: 100
>             virtual-address: 172.20.1.254
>             authentication: "xxxxxx"
>             advertise-interval: 1
>             preempt: true
>             priority: 1
>         }
>     }
> }
> service {
>     nat {
>         rule 2 {
>             type: "source"
>             inbound-interface: "eth0"
>             outbound-interface: "eth1"
>             protocols: "all"
>             source {
>                 address: "172.20.0.1"
>             }
>             destination {
>                 network: "0.0.0.0/0"
>             }
>             outside-address {
>                 address: x.x.x.2
>             }
>         }
>         rule 3 {
>             type: "destination"
>             inbound-interface: "eth1"
>             outbound-interface: "eth0"
>             protocols: "all"
>             source {
>                 network: "0.0.0.0/0"
>             }
>             destination {
>                 address: "x.x.x.2"
>             }
>             inside-address {
>                 address: 172.20.0.1
>             }
>         }
>         rule 4 {
>             type: "source"
>             inbound-interface: "eth0"
>             outbound-interface: "eth1"
>             protocols: "tcp"
>             source {
>                 address: "192.168.10.5"
>             }
>             destination {
>                 network: "0.0.0.0/0"
>             }
>             outside-address {
>                 address: x.x.x.3
>             }
>         }
>         rule 5 {
>             type: "destination"
>             inbound-interface: "eth1"
>             outbound-interface: "eth0"
>             protocols: "tcp"
>             source {
>                 network: "0.0.0.0/0"
>             }
>             destination {
>                 address: "x.x.x.3"
>                 port-number 25
>             }
>             inside-address {
>                 address: 192.168.10.5
>                 port-number: 25
>             }
>         }
>         rule 6 {
>             type: "destination"
>             inbound-interface: "eth1"
>             outbound-interface: "eth0"
>             protocols: "tcp"
>             source {
>                 network: "0.0.0.0/0"
>             }
>             destination {
>                 address: "x.x.x.3"
>                 port-number 80
>             }
>             inside-address {
>                 address: 192.168.10.5
>                 port-number: 80
>             }
>         }
>         rule 7 {
>             type: "destination"
>             inbound-interface: "eth1"
>             outbound-interface: "eth0"
>             protocols: "tcp"
>             source {
>                 network: "0.0.0.0/0"
>             }
>             destination {
>                 address: "x.x.x.3"
>                 port-name https
>             }
>             inside-address {
>                 address: 192.168.10.5
>                 port-number: 443
>             }
>         }
>         rule 8 {
>             type: "destination"
>             inbound-interface: "eth1"
>             outbound-interface: "eth0"
>             protocols: "tcp"
>             destination {
>                 address: "x.x.x.29"
>                 port-number 1723
>             }
>             inside-address {
>                 address: 192.168.10.2
>                 port-number: 1723
>             }
>         }
>         rule 9 {
>             type: "source"
>             inbound-interface: "eth0"
>             outbound-interface: "eth1"
>             protocols: "tcp"
>             source {
>                 address: "192.168.10.2"
>                 port-number 1723
>             }
>             outside-address {
>                 address: x.x.x.29
>                 port-number: 1723
>             }
>         }
>         rule 10 {
>             type: "destination"
>             inbound-interface: "eth1"
>             outbound-interface: "eth0"
>             protocols: "gre"
>             destination {
>                 address: "x.x.x.29"
>             }
>             inside-address {
>                 address: 192.168.10.2
>             }
>         }
>         rule 1023 {
>             type: "masquerade"
>             outbound-interface: "eth1"
>             source {
>                 network: "192.168.10.0/23"
>             }
>         }
>         rule 1024 {
>             type: "masquerade"
>             outbound-interface: "eth1"
>             source {
>                 network: "172.20.0.0/23"
>             }
>         }
>     }
>     webgui {
>         http-port: 80
>         https-port: 443
>     }
> }
> firewall {
>     log-martians: "enable"
>     send-redirects: "disable"
>     receive-redirects: "disable"
>     ip-src-route: "disable"
>     broadcast-ping: "disable"
>     syn-cookies: "enable"
>      name "DMZ_IN" {
>          description: "Input packet from public network into DMZ"
>          rule 1 {
>              protocol: "udp"
>              action: "accept"
>              log: "disable"
>              source {
>                  port-name: "domain"
>              }
>          }
>          rule 2 {
>              protocol: "icmp"
>              action: "accept"
>              log: "disable"
>          }
>          rule 3 {
>              protocol: "udp"
>              action: "accept"
>              log: "disable"
>              destination {
>                  port-name: "domain"
>              }
>          }
>          rule 4 {
>              protocol: "tcp"
>              action: "accept"
>              log: "disable"
>              source {
>                  port-name: "domain"
>              }
>          }
>          rule 5 {
>              protocol: "tcp"
>              state {
>                  established: "enable"
>              }
>              action: "accept"
>              log: "disable"
>          }
>          rule 6 {
>              protocol: "tcp"
>              action: "accept"
>              log: "disable"
>              destination {
>                  address: 192.168.10.5
>                  port-name: "smtp"
>              }
>          }
>          rule 7 {
>              protocol: "tcp"
>              action: "accept"
>              log: "disable"
>              destination {
>                  port-name: "http"
>              }
>          }
>          rule 8 {
>              protocol: "tcp"
>              action: "accept"
>              log: "disable"
>              destination {
>                  port-name: "https"
>              }
>          }
>          rule 9 {
>              protocol: "gre"
>              action: "accept"
>              log: "disable"
>              destination {
>                  address: 192.168.10.2
>              }
>          }
>          rule 10 {
>              protocol: "tcp"
>              action: "accept"
>              log: "disable"
>              destination {
>                  port-range {
>                      start: 20
>                      stop: 21
>                  }
>              }
>          }
>     }
> }
>
>
> but it fails to load. the xorpsh process shot up to 100% cpu and did
> not load the config.  The shell just sits there with [edit] showing
> and does not return me back to the shell.  I have to press Ctrl-C to
> abort the operation.  When I then exit configuration mode I get the
> message
>
> Finder disconnected. No Finder?
>
> Does anyone have any idea why this could be?
> Thanks
> _______________________________________________
> Vyatta-users mailing list
> Vyatta-users@mailman.vyatta.com
> http://mailman.vyatta.com/mailman/listinfo/vyatta-users
>   
_______________________________________________
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users

Reply via email to