Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Quagga OSPF Error IP_ADD_MEMBERSHIP

    Scheduled Pinned Locked Moved pfSense Packages
    14 Posts 2 Posters 5.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      jsmwalker
      last edited by

      Hi there,

      Same error either removing/enablong rfc and the priority settings.

      J

      1 Reply Last reply Reply Quote 0
      • jimpJ Offline
        jimp Rebel Alliance Developer Netgate
        last edited by

        OK, so it's probably not anything in Quagga itself, but the OS preventing it on that interface.

        Guess it could be because you're doing that on the VLAN parent interface. We don't recommend using the default (untagged) vlan parent interface when performing VLAN trunking. You should only assign tagged interfaces (em0_vlanXXX) once you define them.

        That or maybe there is some other daemon latched onto that interface doing something.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • jimpJ Offline
          jimp Rebel Alliance Developer Netgate
          last edited by

          I updated quagga last night and at least one person who was previously seeing this error is working fine now. So if you try it again on this setup, it may be working.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • J Offline
            jsmwalker
            last edited by

            Cool will give it a shout tonight and confirm in the morning

            Many thanks for keeping me updated

            J

            1 Reply Last reply Reply Quote 0
            • J Offline
              jsmwalker
              last edited by

              Hi there,

              Managed to test, looking better but still can't get them talking, basically have one running on the WAN interface and one on the LAN, LAN sees the one on the WAN interface, but stays in a state of :

              172.x.x.x    1 Init/DROther      30.164s 172.x.x.x  em0:172.x.x.x        0    0    0

              The one on the WAN never sees this one at all.

              Getting the following error on the LAN side..

              ospfd[55865]: Packet 172.x.x.x (WAN_Address) [Hello:RECV]: NetworkMask mismatch on em0:172.x.x.x (LAN_Address) (configured prefix length is 24, but hello packet indicates 32).

              Just to clarify, basically the one I refer to us WAN is actually an internal child network used for testing, am sure this is really obvious and just a setting, i'll have a play and come back, if you know instantly whats wrong let me know

              Cheers

              J

              1 Reply Last reply Reply Quote 0
              • J Offline
                jsmwalker
                last edited by

                Ok, just converted pfsense to router on the inside interface as I am making the massive jump that multicast's are not accepted on the WAN interface and everything working as expected.

                Assuming I am right about multicasts, I can't imagine many situations where OSPF will be enabled on a WAN interface, but would be useful to know if there is a way to accept these?

                If however I am wrong (and yes did have a rule allowing all to WAN so can't imagine this was a rule blocking) any other others?

                Many thanks for all your work on this

                J

                1 Reply Last reply Reply Quote 0
                • J Offline
                  jsmwalker
                  last edited by

                  Sorry guys, all fixed, added a rule in for OSPF itself and of course the WAN address in my previous rule is incorrect, it needs to be multicast address. Anyway, all perfect and working

                  Many thanks

                  J

                  1 Reply Last reply Reply Quote 0
                  • J Offline
                    jsmwalker
                    last edited by

                    Hi there,

                    Just as an update, it looks like the do not redistrubite option doesn't have any affect, I have added in a connected network to not be redistrubited but is still showing on the other fw as an ospf route, checking the config it is within the ospf.conf file as:

                    no  network 192.x.x.x/24 area 0.0.0.0

                    Any ideas?

                    Cheers

                    J

                    1 Reply Last reply Reply Quote 0
                    • jimpJ Offline
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      Quagga probably needs some fancier syntax there that I don't know yet – perhaps some kind of route map exclusion.

                      I haven't had a situation to use that with yet, so I didn't get to fully vet that part.

                      If you (or someone else) can track down some syntax examples for that in quagga (or cisco, quagga's config is nearly identical to ios) I can fix the code.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • J Offline
                        jsmwalker
                        last edited by

                        Hi mate, Just seen it works the other way i.e. no ticking the box distributes the route so for me thats perfect anyway, will do some research and see if I can work out how to do the excludes.

                        At the moment this is perfect for me, so seriously many thanks, the whole project is fantastic

                        J

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.