With prefix delegation you have a static prefix on your inside, but the "wan" interface on the router is using DHCP.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Jan 16 2018
Jan 16 2018
beamerblvd added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
aopdal added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
With prefix delegation you have a static prefix on your inside, but the "wan" interface on the router is using DHCP.
aopdal added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
Without routing you probably can't get it to work. Are your addresses managed from Comcast using prefix delegation?
beamerblvd added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
@beamerblvd have you added routes for your vif 100,200 and 900 in your "COMCAST BUSINESS IP GATEWAY"?
aopdal added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
@beamerblvd have you added routes for your vif 100,200 and 900 in your "COMCAST BUSINESS IP GATEWAY"?
beamerblvd added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
So the attempts with /56 and /60 were part of my hundreds of different combinations/attempts to get this to work. I have one /56 assigned to me (2603:xxxx:xxxx:8700::/56) with one gateway assigned to me (2603:xxxx:xxxx:8700:7454:7dff:feb1:d391). Skipping the WAN for just a second because I believe(d) it to need different configuration, I expected to be able to break that /56 up into /64s and use them like so:
elico added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
I am willing to give some advice but it's an issue to understand your infrastructure based on a very fuzzy set of details.
The basic rule of thumb that I can think of is that you cannot assign ip addresses with the same or overlapping prefix on two interfaces and route between them.
I do not know if the VyOS kernel supports IPV6 NAT feature but this should be a very last resort for specific scenarios.
If you need some examples on how IPv6 prefixes are being used you can try to peek at some IPv6 brokers such as Hurricane Electric.
They give you a very specific IPv6 address and prefix for the WAN side with a specific default route,
Then they give you a different prefix to assign the internal network which is behind the main gateway.
Is your setup different then what HE offers?
aopdal added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
Perhaps you could make a drawing of what you try to get working? With proper interface naming etc. eth0 - wan, eth1 - dmz, eth2 - lan or whatever you are using. It makes it easier to understand what you try to do. And for the interfaces why do you want to use the /60?
beamerblvd added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
Maybe this is relevant? https://phabricator.vyos.net/T421
aopdal added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
Maybe this is relevant? https://phabricator.vyos.net/T421
beamerblvd added a comment to Q122: How to properly configure multiple static IPv4 WAN addresses and IPv6 prefix to internal DHCP and static hosts.
So, I ended up handling my IPv4 addresses using 1:1 NAT. It works, and I don't love it, but I think it's the best it's going to get with Comcast's clunky static IP infrastructure. But I'm having no luck with IPv6, and could really use some help with someone who understand's static IPv6 and VyOS a little better. I have a static IPv6 prefix, and I need to statically assign some of those to public-facing servers behind my firewall/router, but it's like pulling teeth from a rhinoceros.
I've found memory leak bug in Cstore perl binding (perlxs).
This binding is a part of vyatta-cfg.
Jan 15 2018
Jan 15 2018
Jan 14 2018
Jan 14 2018
That is fine, maybe with exception for some nasty vulnerabilities, however we also not disappear
just handy to have someone dedicated to wireless (almost separate world)
Thank you!
@syncer thanks for the offer :)
syncer triaged T515: Complete the documentation on the suggested Python / XML config framework as Normal priority.
syncer triaged T514: Concentration and streamlining of Python / XML config framework documentation as Normal priority.
syncer triaged T513: Docs for devs: How to use Python, XML et al instead of Bash and Perl for VyOS configuration as Normal priority.
syncer moved T512: New package versions not synced to http://dev.packages.vyos.net from Need Triage to Finished on the VyOS 1.2 Crux board.
@c-po i think this was fixed by @dmbaturin
marking as solved, if not, reopen
syncer closed T507: vyatta-cfg-system -> SSH: Failure to correctly alter Ciphers and MACs as Resolved.
@alainlamar by any chance you want to be maintainer of wireless subsystem ? :)
It looks like you both have knowledge and real life use case and that make it whole easier
alainlamar renamed T521: Network services may fail if vyatta-router.service startup takes longer than a few seconds from Network services may fail if vyatta-router.service startup takes longe rthan a few seconds to Network services may fail if vyatta-router.service startup takes longer than a few seconds.
alainlamar renamed T521: Network services may fail if vyatta-router.service startup takes longer than a few seconds from Network Services start before vyatta-router.service is started to Network services may fail if vyatta-router.service startup takes longe rthan a few seconds.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
Jan 13 2018
Jan 13 2018
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
Jan 12 2018
Jan 12 2018
agustafson added a comment to T383: snmpd messages in log with nightly "vyos-999.201709032137-amd64.iso".
I am seeing similar messages in 1.1.8.
shamidrasool updated the answer details for Q117: Instructions to build VyOS 1.2 from sources with frr (Answer 169).
Jan 11 2018
Jan 11 2018
The downloads.vyos.io is now using mandatory HTTPS. On the dev.packages.vyos.net, HTTPS is optional. To declare this closed, we need someone to independently verify that ISO build works with HTTPS for them.
Jan 7 2018
Jan 7 2018
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated subscribers of T513: Docs for devs: How to use Python, XML et al instead of Bash and Perl for VyOS configuration.
@c-po thanks for pointing me to the interface definitions!
alainlamar updated the task description for T513: Docs for devs: How to use Python, XML et al instead of Bash and Perl for VyOS configuration.
@alainlamar nice work digging!
alainlamar added a comment to T517: Rewrite the wireless interface configuration in the new style (python + XML).
I found an example file in vyatta-lldp:
I found an example XML tag config file in vyatta-lldp:
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
alainlamar updated the task description for T452: WiFi: Enable support for 5GHz AccesPoints with DFS.
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
I'm using ntop-ng + nprobe.
alainlamar changed the visibility for T513: Docs for devs: How to use Python, XML et al instead of Bash and Perl for VyOS configuration.
alainlamar updated the task description for T513: Docs for devs: How to use Python, XML et al instead of Bash and Perl for VyOS configuration.
alainlamar updated the task description for T513: Docs for devs: How to use Python, XML et al instead of Bash and Perl for VyOS configuration.
alainlamar added projects to T513: Docs for devs: How to use Python, XML et al instead of Bash and Perl for VyOS configuration: VyOS 1.2 Crux, Restricted Project.
@syncer tools added to base image. This would be perfect for a vyos-1x op mode command. Unfortunately I was not able to build a working template with the relax-ng templates (lack of xml/relax-ng) knowledge. @dmbaturin maybe you can help?
Jan 6 2018
Jan 6 2018
c-po added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
@squeeby which sflow collector do you use? Is there one you can recommend?
c-po updated the task description for T512: New package versions not synced to http://dev.packages.vyos.net.
c-po moved T379: UDP Broadcast Packet Relay from In Progress to Finished on the VyOS 1.2 Crux board.
Rewrote the scripts using vyos-1x and Python. This is now functioning on my routers.
Working again
Jan 5 2018
Jan 5 2018
I like the way it works now, but honestly as long as I can get to both the CLI and the OS shell somehow (with a command), I don't really care which is the default.
c-po moved T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown from In Progress to Finished on the VyOS 1.2 Crux board.
c-po moved T510: vyos-1x generated crontab nodes missleading from In Progress to Finished on the VyOS 1.2 Crux board.
c-po added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
Merged into vyatta-netflow package and will be included in tonights build.
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
Looks good!
c-po added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
Ok, next try: https://www.mybll.net/vyatta-netflow_ver02_all.deb
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
This appears to operate as expected.
c-po added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
Could you alter the file manually to get a working state and pass it to me by e.g. pasting it here or a https://pastebin.com/ link? Then I could regenerate a package for testing. This would help me a lot as I do not have any flow collector.
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
So by reverting, the file /opt/vyatta/sbin/vyatta-netflow.pl contains:
328 sub acct_add_nflog_target { 329 my ($intf) = @_; 330 331 my ($table_chain) = acct_get_table_chain(); 332 while (my ($chain, $table) = each(%$table_chain)) { 333 my $cmd = "iptables -t $table -I $chain 1 -i $intf -j NFLOG" ." --nflog-group 2"; 334 if (defined $nflog_range) { 335 $cmd .= " --nflog-range $nflog_range"; 336 } 337 if (defined $nflog_threshold) { 338 $cmd .= " --nflog-threshold $nflog_threshold"; 339 } 340 my $ret = system($cmd); 341 if ($ret >> 8) { 342 die "Error: [$cmd] failed - $?\n"; 343 } 344 } 345 }
c-po added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
You can revert by switching back to the official VyOS package.
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
Do you know how I can restore the previous version so I can see if it was this package that changed it?
c-po added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
Strange. I only changed /opt/vyatta/sbin/vyatta-netflow.pl to your recommendation.
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
I applied your patch but now iptables has reverted to using the ULOG target instead of NFLOG:
squeeb@gw1# commit [ system flow-accounting interface eth2 ] iptables: No chain/target/match by that name. Error: [iptables -t raw -I VYATTA_CT_PREROUTING_HOOK 1 -i eth2 -j ULOG --ulog-nlgroup 2 --ulog-cprange 64 --ulog-qthreshold 10] failed - 256
c-po moved T510: vyos-1x generated crontab nodes missleading from Need Triage to In Progress on the VyOS 1.2 Crux board.
c-po added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
@squeeby do you mind verifying the following package containing your fix:
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
Changing the following lines to the excerpt below in /opt/vyatta/sbin/vyatta-netflow.pl seems to work:
squeeby added a comment to T296: Enabling NetFlow fails, iptables chain VYATTA_CT_PREROUTING_HOOK unknown.
# show system flow-accounting interface pppoe0 interface eth2.2 interface eth2.3 sflow { agent-address 192.168.64.1 sampling-rate 10 server 192.168.64.10 { port 2055 } }
Jan 4 2018
Jan 4 2018
Jan 3 2018
Jan 3 2018