Network engineer, Linux system administrator
User Details
- User Since
- Oct 30 2021, 9:19 AM (161 w, 6 d)
Jun 15 2024
Forum thread with a nice workaround by giuppo77: https://forum.vyos.io/t/wan-failover-with-dhcp/
Not a generic solution but maybe an inspiration for implementation.
Forum thread with a nice workaround by giuppo77: https://forum.vyos.io/t/wan-failover-with-dhcp/
Not a generic solution but maybe an inspiration for implementation.
Apr 13 2024
Link to forum thread: https://forum.vyos.io/t/output-similar-to-packet-tracer/
Jan 17 2024
@Viacheslav tested and confirmed fixed in RC2.
Jan 14 2024
I take it RC2 will contain these new versions @Viacheslav?
Seems you're right @indrajitr:
Jan 13 2024
Jan 10 2024
See also forum thread @ https://forum.vyos.io/t/grub-menu-fails-to-load-on-serial-only-devices-with-no-kvm/
Nov 6 2023
That looks better:
chain VZONE_LOCAL_OUT { oifname "lo" counter packets 387 bytes 33672 return oifname "bond0.40" counter packets 14 bytes 496 jump NAME_LOCAL_TO_ALL oifname "bond0.40" counter packets 0 bytes 0 return oifname "bond0.70" counter packets 0 bytes 0 jump NAME_LOCAL_TO_ALL oifname "bond0.70" counter packets 0 bytes 0 return r packets 0 bytes 0 jump NAME_LOCAL_TO_ALL oifname { "bond0.7", "bond0.30", "bond0.90", "bond0.88" } counter packets 0 bytes 0 return oifname { "eth0", "pppoe0", "eth1.281" } counter packets 3 bytes 180 jump NAME_LOCAL_TO_ALL oifname { "eth0", "pppoe0", "eth1.281" } counter packets 0 bytes 0 return oifname "bond0.80" counter packets 2 bytes 80 jump NAME_LOCAL_TO_ALL oifname "bond0.80" counter packets 0 bytes 0 return oifname { "bond0.1", "podman-cntr-net" } counter packets 2 bytes 128 jump NAME_LOCAL_TO_ALL oifname { "bond0.1", "podman-cntr-net" } counter packets 0 bytes 0 return oifname { "wg0", "vti0", "vtun0", "podman-ts-net" } counter packets 0 bytes 0 jump NAME_LOCAL_TO_ALL oifname { "wg0", "vti0", "vtun0", "podman-ts-net" } counter packets 0 bytes 0 return counter packets 0 bytes 0 drop comment "zone_LOCAL default-action drop" }
Thanks, I'll wait for the merge and test the new iso ASAP.
Nov 4 2023
@n.fort Unfortunately, I'm hitting an issue with traffic sent from the router itself.
Running 1.4-rolling-202311021131.
Interfaces eth0 and pppoe0 are WAN. Interfaces bond0* are LAN.
For example, running dig google.nl @9.9.9.9 from the VyOS CLI will fail. The kernel log says:
Nov 2 2023
@Viacheslav @n.fort Regarding https://github.com/vyos/vyos-1x/pull/2388: I just tested on 1.4-rolling-202311021131: ZBF config from 1.4-rolling-202304120317 loaded without a hitch.
This is a 8 zone, 959 line config.
Apr 13 2023
@Viacheslav confirmed working.
@Viacheslav Confirmed fixed, thank you.
Apr 5 2023
Thanks @Viacheslav will test ASAP, next week I have a maintenance window, will let you know.
Mar 15 2023
@Viacheslav Confirmed, that is the culprit.
To be precise: I deleted ipsec-dhclient-hook and renamed 98-vyatta-dhclient-hook back to vyatta-dhclient-hook. Then I ran a renew dhcp interface eth0 and I got a correct .lease file.
Even when the IPSec script is fixed, it might be wise to prepend all scripts in /etc/dhcp/dhclient-exit-hooks.d with a number to enforce script order execution, just like in /etc/dhcp/dhclient-enter-hooks.d.
Mar 13 2023
@Viacheslav I may be on to something. It's related to the order of execution of the DHCP client exit hook scripts in /etc/dhcp/dhclient-exit-hooks.d.
Feb 21 2023
Thanks @Viacheslav https://github.com/vyos/vyos-1x/pull/1838 fixed it for me.
Feb 20 2023
Same problem here, on 1.3:
Feb 19 2023
@c-po confirmed fixed, thank you.
Nov 25 2022
Nov 8 2022
TLDR; confirmed fixed for 1.3, please backport.
Nov 24 2021
Brilliant, thanks @c-po!
@c-po I see that you've marked this as resolved, but I don't see any comments (maybe I'm doing something wrong). I'd appreciate some feedback.
Is it resolved as in: will be fixed as soon as third-party code is fixed? Or have you made changes to the code to mitigate?