Intermittent "no route to host" on my LAN-port
-
05/14/17 13:47:17 SNTP: updated time by -4 seconds
05/15/17 08:43:51 ports: port 34 is now off-line
05/15/17 08:43:51 ports: port 1 is now off-line
05/15/17 08:43:51 ports: port 37 is now off-line
05/15/17 08:43:51 ports: port 41 is now off-line
05/15/17 08:43:54 ports: port 1 is Blocked by LACP
05/15/17 08:43:54 ports: port 34 is Blocked by LACP
05/15/17 08:43:54 ports: port 37 is Blocked by LACP
05/15/17 08:43:55 ports: port 41 is Blocked by LACP
05/15/17 08:43:57 ports: port 1 is now on-lineNext time login to the procurve and snag the log before rebooting the pfsense.
I'm a pfsense newbie (but know networking) , and would not expect it to participate in STP (spanning tree protocol) as it's a L3 firewall.
But then again … It has bridge mode ... and should be STP capable (at least i that mode)So you have 2 tagged vlans and one untagged vlan on that interface ?
Is it only the untagged vlan that have this problem , or does the same problem occur (at the same time) on the other tagged vlans ?
/Bingo
-
Wierd as it seems, it is only the untagged VLAN that starts to behave badly, the tagged VLAN's are completely fine.
-
Surely there has to be a loglevel that can reveal what the problem is?
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
64 bytes from 192.168.1.9: icmp_seq=168 ttl=64 time=1.496 ms
64 bytes from 192.168.1.9: icmp_seq=169 ttl=64 time=0.721 ms
64 bytes from 192.168.1.9: icmp_seq=170 ttl=64 time=0.742 ms
64 bytes from 192.168.1.9: icmp_seq=171 ttl=64 time=0.915 ms
64 bytes from 192.168.1.9: icmp_seq=172 ttl=64 time=0.784 ms
64 bytes from 192.168.1.9: icmp_seq=173 ttl=64 time=0.510 ms
64 bytes from 192.168.1.9: icmp_seq=174 ttl=64 time=1.138 ms
64 bytes from 192.168.1.9: icmp_seq=175 ttl=64 time=0.760 ms
64 bytes from 192.168.1.9: icmp_seq=176 ttl=64 time=0.586 ms
64 bytes from 192.168.1.9: icmp_seq=177 ttl=64 time=0.664 ms
64 bytes from 192.168.1.9: icmp_seq=178 ttl=64 time=0.724 ms
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
64 bytes from 192.168.1.9: icmp_seq=185 ttl=64 time=1.198 ms
64 bytes from 192.168.1.9: icmp_seq=186 ttl=64 time=1.222 ms
64 bytes from 192.168.1.9: icmp_seq=187 ttl=64 time=0.845 ms
64 bytes from 192.168.1.9: icmp_seq=188 ttl=64 time=0.760 ms
64 bytes from 192.168.1.9: icmp_seq=189 ttl=64 time=0.890 ms
64 bytes from 192.168.1.9: icmp_seq=190 ttl=64 time=0.815 ms
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
64 bytes from 192.168.1.9: icmp_seq=206 ttl=64 time=1.395 ms
64 bytes from 192.168.1.9: icmp_seq=207 ttl=64 time=1.413 ms
64 bytes from 192.168.1.9: icmp_seq=208 ttl=64 time=0.548 ms
64 bytes from 192.168.1.9: icmp_seq=209 ttl=64 time=0.767 ms
64 bytes from 192.168.1.9: icmp_seq=210 ttl=64 time=0.872 ms
64 bytes from 192.168.1.9: icmp_seq=211 ttl=64 time=0.613 ms
64 bytes from 192.168.1.9: icmp_seq=212 ttl=64 time=0.740 ms
64 bytes from 192.168.1.9: icmp_seq=213 ttl=64 time=0.770 ms
64 bytes from 192.168.1.9: icmp_seq=214 ttl=64 time=0.585 ms
64 bytes from 192.168.1.9: icmp_seq=215 ttl=64 time=0.809 ms
64 bytes from 192.168.1.9: icmp_seq=216 ttl=64 time=0.738 ms
64 bytes from 192.168.1.9: icmp_seq=217 ttl=64 time=0.865 ms
64 bytes from 192.168.1.9: icmp_seq=218 ttl=64 time=0.780 ms
64 bytes from 192.168.1.9: icmp_seq=219 ttl=64 time=0.705 ms
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
ping: sendto: No route to host
64 bytes from 192.168.1.9: icmp_seq=228 ttl=64 time=1.111 ms -
Can you ping the pfSense ip address , on the affected untagged vlan, while the problem is there??
/Bingo
-
Can you ping the pfSense ip address , on the affected untagged vlan, while the problem is there??
A lan wks -> pfSense ip FAIL
pfSense -> a lan wks FAIL
pfSense -> a tagged lan server on the same port as the untagged lan SUCCESS
A lan wks -> a tagged lan server on the same port as the untagged lan SUCCESSLike that.
-
I now moved my LAN from untagged to tagged (I tagged it on pfSense and on the switch). It will be a bitch if my switch dies to recover, but theres always something you can do over the terminal.
Anyway, let's see if this solves the issue. Then we know that VLANs and raw LAN's and pfSense and Watchguard and Procurve donät work together well.
-
Some people say don't mix tagged and untagged traffic on an interface for a reason.
I would suspect an ARP issue there, but those intervals are awfully short for that. Could also be a simple no carrier on the ethernet interface. Have you tried another cable? Another switchport? But if it is only the default VLAN and not the tagged interfaces, that pretty much rules out layer 1.
Dealing with a tagged port is not really a bitch to deal with if you have the right tools.
![Screen Shot 2017-05-23 at 2.58.57 AM.png](/public/imported_attachments/1/Screen Shot 2017-05-23 at 2.58.57 AM.png)
![Screen Shot 2017-05-23 at 2.58.57 AM.png_thumb](/public/imported_attachments/1/Screen Shot 2017-05-23 at 2.58.57 AM.png_thumb) -
ARP would've been my guess also, but then I don't really understand why it only starts after a while, and then the problem doesn't go away by itself - and the cycle is quite short as you said. But let's see.
The bitchy part is mostly if I need to remove the fw and hook up a laptop directly to the LAN, then it will require a bit of fiddling to get that going. As long as you document the VLAN's it's not such a big deal. And perhaps the correct way is to use the switch to handle the mixing and matching of VLAN's on the switch ports and then just either show all tagged or all untagged to the firewall.
-
It gets worse.
My two OpenVPN tunnels are now doing the same thing.
Request timed out.
Request timed out.
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Request timed out.
Reply from 10.99.10.1: bytes=32 time=49ms TTL=63
Reply from 10.99.10.1: bytes=32 time=52ms TTL=63
Reply from 10.99.10.1: bytes=32 time=47ms TTL=63
Request timed out.
Reply from 10.99.10.1: bytes=32 time=49ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=49ms TTL=63
Request timed out.
Request timed out.
Reply from 10.99.10.1: bytes=32 time=64ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=47ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=48ms TTL=63
Reply from 10.99.10.1: bytes=32 time=49ms TTL=63
Request timed out.
Request timed out.
Reply from 10.99.10.1: bytes=32 time=149ms TTL=63
Reply from 10.99.10.1: bytes=32 time=47ms TTL=63
Reply from 10.99.10.1: bytes=32 time=49ms TTL=63
Reply from 10.99.10.1: bytes=32 time=49ms TTL=63
Reply from 10.99.10.1: bytes=32 time=49ms TTL=63And
Reply from 192.168.69.1: bytes=32 time=126ms TTL=63
Reply from 192.168.69.1: bytes=32 time=36ms TTL=63
Request timed out.
Request timed out.
Reply from 192.168.69.1: bytes=32 time=70ms TTL=63
Reply from 192.168.69.1: bytes=32 time=110ms TTL=63
Reply from 192.168.69.1: bytes=32 time=61ms TTL=63
Request timed out.
Request timed out.
Reply from 192.168.69.1: bytes=32 time=108ms TTL=63
Reply from 192.168.69.1: bytes=32 time=68ms TTL=63
Reply from 192.168.69.1: bytes=32 time=107ms TTL=63
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Reply from 192.168.69.1: bytes=32 time=109ms TTL=63
Request timed out.
Request timed out.
Reply from 192.168.69.1: bytes=32 time=68ms TTL=63
Reply from 192.168.69.1: bytes=32 time=100ms TTL=63
Reply from 192.168.69.1: bytes=32 time=75ms TTL=63
Reply from 192.168.69.1: bytes=32 time=103ms TTL=63
Reply from 192.168.69.1: bytes=32 time=65ms TTL=63
Request timed out.
Request timed out.
Reply from 192.168.69.1: bytes=32 time=108ms TTL=63
Reply from 192.168.69.1: bytes=32 time=68ms TTL=63
Reply from 192.168.69.1: bytes=32 time=93ms TTL=63
Reply from 192.168.69.1: bytes=32 time=67ms TTL=63
Reply from 192.168.69.1: bytes=32 time=106ms TTL=63
Request timed out.Also pingig the firewall
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Request timed out.
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Request timed out.
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Request timed out.
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Request timed out.
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Request timed out.
Reply from 192.168.1.1: bytes=32 time=4ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Reply from 192.168.1.1: bytes=32 time=1ms TTL=64
Request timed out.
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64and poinging my wan
Reply from 188.117.46.161: bytes=32 time=17ms TTL=56
Request timed out.
Reply from 188.117.46.161: bytes=32 time=19ms TTL=56
Reply from 188.117.46.161: bytes=32 time=21ms TTL=56
Reply from 188.117.46.161: bytes=32 time=45ms TTL=56
Reply from 188.117.46.161: bytes=32 time=17ms TTL=56
Reply from 188.117.46.161: bytes=32 time=19ms TTL=56
Reply from 188.117.46.161: bytes=32 time=17ms TTL=56
Reply from 188.117.46.161: bytes=32 time=17ms TTL=56
Reply from 188.117.46.161: bytes=32 time=17ms TTL=56
Request timed out.
Reply from 188.117.46.161: bytes=32 time=18ms TTL=56
Reply from 188.117.46.161: bytes=32 time=18ms TTL=56
Reply from 188.117.46.161: bytes=32 time=17ms TTL=56
Reply from 188.117.46.161: bytes=32 time=18ms TTL=56
Request timed out.
Reply from 188.117.46.161: bytes=32 time=19ms TTL=56I really hate this shit at the moment.
-
So now everything is pretty fucked until I once again reboot the firewall.
-
When the problem (which is now different but the same) occurs, the firewall can now ping everything so no problem there. But now I lose
- VLAN (LAN) -> ovpns5,
- VLAN (LAN)->VLAN (SERVERS1) and
- VLAN (LAN) -> VLAN (SERVERS2).
VLAN (LAN) to the internet is all fine and working.
There has to be some way to debug this.
-
Dumping the routing when the issue occurs:
[2.3.4-RELEASE][root@firewall.ccccccccc.fi]/root: netstat -rn
Routing tablesInternet:
Destination Gateway Flags Netif Expire
default 217.30.178.254 UGS sk0
10.10.1.0/24 link#4 U sk3
10.10.1.1 link#4 UHS lo0
10.99.0.0/16 10.100.100.2 UGS ovpns5
10.100.100.1 link#13 UHS lo0
10.100.100.2 link#13 UH ovpns5
10.100.101.1 link#14 UHS lo0
10.100.101.2 link#14 UH ovpns8
10.200.200.0/24 10.200.200.2 UGS ovpns1
10.200.200.1 link#12 UHS lo0
10.200.200.2 link#12 UH ovpns1
10.200.210.0/24 10.100.100.2 UGS ovpns5
83.145.193.133 217.30.178.254 UGHS sk0
127.0.0.1 link#8 UH lo0
192.168.1.0/24 link#11 U sk1_vlan
192.168.1.1 link#11 UHS lo0
192.168.1.3 link#11 UHS lo0
192.168.2.21 link#11 UHS lo0
192.168.2.21/32 link#11 U sk1_vlan
192.168.10.0/24 link#9 U sk1_vlan
192.168.10.1 link#9 UHS lo0
192.168.20.0/24 link#10 U sk1_vlan
192.168.20.1 link#10 UHS lo0
192.168.69.0/24 10.100.101.2 UGS ovpns8
192.168.100.0/24 link#3 U sk2
192.168.100.1 link#3 UHS lo0
217.30.178.0/24 link#1 U sk0
217.30.178.237 link#1 UHS lo0 -
After reboot
Routing tables
Internet:
Destination Gateway Flags Netif Expire
default 217.30.178.254 UGS sk0
10.10.1.0/24 link#4 U sk3
10.10.1.1 link#4 UHS lo0
10.99.0.0/16 10.100.100.2 UGS ovpns5
10.100.100.1 link#13 UHS lo0
10.100.100.2 link#13 UH ovpns5
10.100.101.1 link#14 UHS lo0
10.100.101.2 link#14 UH ovpns8
10.200.200.0/24 10.200.200.2 UGS ovpns1
10.200.200.1 link#12 UHS lo0
10.200.200.2 link#12 UH ovpns1
10.200.210.0/24 10.100.100.2 UGS ovpns5
83.145.193.133 217.30.178.254 UGHS sk0
127.0.0.1 link#8 UH lo0
192.168.1.0/24 link#11 U sk1_vlan
192.168.1.1 link#11 UHS lo0
192.168.1.3 link#11 UHS lo0
192.168.2.21 link#11 UHS lo0
192.168.2.21/32 link#11 U sk1_vlan
192.168.10.0/24 link#9 U sk1_vlan
192.168.10.1 link#9 UHS lo0
192.168.20.0/24 link#10 U sk1_vlan
192.168.20.1 link#10 UHS lo0
192.168.69.0/24 10.100.101.2 UGS ovpns8
192.168.100.0/24 link#3 U sk2
192.168.100.1 link#3 UHS lo0
217.30.178.0/24 link#1 U sk0
217.30.178.237 link#1 UHS lo0 -
As far as I know, almost nobody is using those sk NICs.
At the same time I haven't heard of anything like what you're seeing either.
-
192.168.1.0/24 link#11 U sk1_vlan
192.168.1.1 link#11 UHS lo0
192.168.1.3 link#11 UHS lo0
192.168.2.21 link#11 UHS lo0
192.168.2.21/32 link#11 U sk1_vlanWhy are both of those on link #11?
netstat -rnWfinet
-
1.1 is the router itself
1.3 is a virtual ip
2.21 is a virtual ip192.168.1.3/32 LAN IP Alias Virtual IP for wpad.malmberg.fi
192.168.2.21/32 LAN IP Alias Virtual IP for wiki.malmberg.fiI also realized that I have had it defined as 1.3/24 instead of 1.3/32 - this I have now changed.
I have run your suggested netstat -command BEFORE and AFTER this change.
BEFORE
netstat -rnWfinet
Routing tablesInternet:
Destination Gateway Flags Use Mtu Netif Expire
default 217.30.178.254 UGS 307699 1500 sk0
10.10.1.0/24 link#4 U 401 1500 sk3
10.10.1.1 link#4 UHS 0 16384 lo0
10.99.0.0/16 10.100.100.2 UGS 66905 1500 ovpns5
10.100.100.1 link#13 UHS 0 16384 lo0
10.100.100.2 link#13 UH 6 1500 ovpns5
10.100.101.1 link#14 UHS 0 16384 lo0
10.100.101.2 link#14 UH 0 1500 ovpns8
10.200.200.0/24 10.200.200.2 UGS 0 1500 ovpns1
10.200.200.1 link#12 UHS 0 16384 lo0
10.200.200.2 link#12 UH 0 1500 ovpns1
10.200.210.0/24 10.100.100.2 UGS 0 1500 ovpns5
83.145.193.133 217.30.178.254 UGHS 111003 1500 sk0
127.0.0.1 link#8 UH 354961 16384 lo0
192.168.1.0/24 link#11 U 2433840 1500 sk1_vlan5
192.168.1.1 link#11 UHS 0 16384 lo0
192.168.1.3 link#11 UHS 0 16384 lo0
192.168.2.21 link#11 UHS 810 16384 lo0
192.168.2.21/32 link#11 U 0 1500 sk1_vlan5
192.168.10.0/24 link#9 U 487 1500 sk1_vlan6
192.168.10.1 link#9 UHS 0 16384 lo0
192.168.20.0/24 link#10 U 36126 1500 sk1_vlan7
192.168.20.1 link#10 UHS 0 16384 lo0
192.168.69.0/24 10.100.101.2 UGS 0 1500 ovpns8
192.168.100.0/24 link#3 U 0 1500 sk2
192.168.100.1 link#3 UHS 0 16384 lo0
217.30.178.0/24 link#1 U 0 1500 sk0
217.30.178.237 link#1 UHS 0 16384 lo0AFTER
Routing tables
Internet:
Destination Gateway Flags Use Mtu Netif Expire
default 217.30.178.254 UGS 309567 1500 sk0
10.10.1.0/24 link#4 U 401 1500 sk3
10.10.1.1 link#4 UHS 0 16384 lo0
10.99.0.0/16 10.100.100.2 UGS 67281 1500 ovpns5
10.100.100.1 link#13 UHS 0 16384 lo0
10.100.100.2 link#13 UH 6 1500 ovpns5
10.100.101.1 link#14 UHS 0 16384 lo0
10.100.101.2 link#14 UH 0 1500 ovpns8
10.200.200.0/24 10.200.200.2 UGS 0 1500 ovpns1
10.200.200.1 link#12 UHS 0 16384 lo0
10.200.200.2 link#12 UH 0 1500 ovpns1
10.200.210.0/24 10.100.100.2 UGS 0 1500 ovpns5
83.145.193.133 217.30.178.254 UGHS 111477 1500 sk0
127.0.0.1 link#8 UH 357517 16384 lo0
192.168.1.0/24 link#11 U 2435972 1500 sk1_vlan5
192.168.1.1 link#11 UHS 0 16384 lo0
192.168.1.3 link#11 UHS 0 16384 lo0
192.168.1.3/32 link#11 U 0 1500 sk1_vlan5
192.168.2.21 link#11 UHS 0 16384 lo0
192.168.2.21/32 link#11 U 0 1500 sk1_vlan5
192.168.10.0/24 link#9 U 490 1500 sk1_vlan6
192.168.10.1 link#9 UHS 0 16384 lo0
192.168.20.0/24 link#10 U 36269 1500 sk1_vlan7
192.168.20.1 link#10 UHS 0 16384 lo0
192.168.69.0/24 10.100.101.2 UGS 0 1500 ovpns8
192.168.100.0/24 link#3 U 0 1500 sk2
192.168.100.1 link#3 UHS 0 16384 lo0
217.30.178.0/24 link#1 U 0 1500 sk0
217.30.178.237 link#1 UHS 0 16384 lo0 -
I know this is not a perfect timeline, but two simultaneous windows though.
11:33:52.822204 ARP, Request who-has 192.168.20.7 tell 192.168.20.1, length 28
11:33:52.822442 ARP, Reply 192.168.20.7 is-at 7a:f5:5b:ff:c9:c4, length 42
11:33:52.822452 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11405, length 40
11:33:52.822642 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11405, length 40
11:33:53.822241 ARP, Request who-has 192.168.20.7 tell 192.168.20.1, length 28
11:33:53.822469 ARP, Reply 192.168.20.7 is-at 7a:f5:5b:ff:c9:c4, length 42
11:33:53.822482 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11407, length 40
11:33:53.822669 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11407, length 40
11:33:54.823260 ARP, Request who-has 192.168.20.7 tell 192.168.20.1, length 28
11:33:54.823490 ARP, Reply 192.168.20.7 is-at 7a:f5:5b:ff:c9:c4, length 42
11:33:54.823501 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11409, length 40
11:33:54.823690 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11409, length 40
11:33:55.825579 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11411, length 40
11:33:55.825812 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11411, length 40
11:33:56.826596 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11414, length 40
11:33:56.826836 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11414, length 40
11:33:57.829819 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11417, length 40
11:33:57.830054 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11417, length 40Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.20.7: bytes=32 time=3ms TTL=63
Reply from 192.168.20.7: bytes=32 time=114ms TTL=63
Reply from 192.168.20.7: bytes=32 time=2ms TTL=63
Reply from 192.168.20.7: bytes=32 time=3ms TTL=63
Reply from 192.168.20.7: bytes=32 time=3ms TTL=63
Reply from 192.168.20.7: bytes=32 time=6ms TTL=63
Reply from 192.168.20.7: bytes=32 time=1ms TTL=63
Reply from 192.168.20.7: bytes=32 time=3ms TTL=63
Reply from 192.168.20.7: bytes=32 time=2ms TTL=63
Reply from 192.168.20.7: bytes=32 time=2ms TTL=63
Reply from 192.168.20.7: bytes=32 time=1ms TTL=63
Reply from 192.168.20.7: bytes=32 time=3ms TTL=63So WTF is going on with these ARP's.
-
11:35:52.476415 ARP, Request who-has 192.168.20.7 tell 192.168.20.1, length 28
11:35:52.476692 ARP, Reply 192.168.20.7 is-at 7a:f5:5b:ff:c9:c4, length 42
11:35:52.476703 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11614, length 40
11:35:52.476892 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11614, length 40
11:35:53.475585 ARP, Request who-has 192.168.20.7 tell 192.168.20.1, length 28
11:35:53.475821 ARP, Reply 192.168.20.7 is-at 7a:f5:5b:ff:c9:c4, length 42
11:35:53.475833 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11616, length 40
11:35:53.476019 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11616, length 40
11:35:53.890421 IP 192.168.20.7.138 > 192.168.1.255.138: UDP, length 227
11:35:54.477796 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11619, length 40
11:35:54.478040 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11619, length 40
11:35:55.477931 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11622, length 40
11:35:55.478166 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11622, length 40
11:35:56.478949 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11625, length 40
11:35:56.479188 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11625, length 40
11:35:57.479970 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11628, length 40
11:35:57.480212 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11628, length 40
11:35:58.480948 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11631, length 40
11:35:58.481133 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11631, length 40
11:35:59.482083 ARP, Request who-has 192.168.20.7 tell 192.168.20.1, length 28
11:35:59.482256 ARP, Reply 192.168.20.7 is-at 7a:f5:5b:ff:c9:c4, length 42
11:35:59.482261 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11634, length 40
11:35:59.482455 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11634, length 40
11:36:00.483100 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11637, length 40
11:36:00.483379 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11637, length 40
11:36:01.483127 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11640, length 40
11:36:01.483305 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11640, length 40
11:36:02.485267 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11643, length 40
11:36:02.485527 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11643, length 40
11:36:03.485210 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11646, length 40
11:36:03.485452 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11646, length 40
11:36:04.485242 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11649, length 40
11:36:04.485476 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11649, length 40
11:36:04.485776 ARP, Request who-has 192.168.20.1 tell 192.168.20.7, length 42
11:36:04.485786 ARP, Reply 192.168.20.1 is-at 00:90:7f:40:45:54, length 28
11:36:04.597913 IP 192.168.20.7.139 > 192.168.1.166.57005: tcp 4
11:36:05.369166 IP 192.168.1.14.137 > 192.168.20.7.137: UDP, length 50
11:36:05.369769 IP 192.168.20.7.137 > 192.168.1.14.137: UDP, length 62
11:36:05.370391 IP 192.168.1.14.138 > 192.168.20.7.138: UDP, length 177
11:36:05.374596 IP 192.168.1.14.3514 > 192.168.20.7.139: tcp 0
11:36:05.374863 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 0
11:36:05.375069 IP 192.168.1.14.3514 > 192.168.20.7.139: tcp 0
11:36:05.388350 IP 192.168.1.14.3514 > 192.168.20.7.139: tcp 72
11:36:05.388543 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 0
11:36:05.389041 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 4
11:36:05.389148 IP 192.168.1.14.3514 > 192.168.20.7.139: tcp 0
11:36:05.389347 IP 192.168.1.14.3514 > 192.168.20.7.139: tcp 194
11:36:05.394133 IP 192.168.20.7.57303 > 192.168.1.1.53: UDP, length 37
11:36:05.428884 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 0
11:36:05.487307 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11652, length 40
11:36:05.487495 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11652, length 40
11:36:06.488447 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11655, length 40
11:36:06.488719 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11655, length 40
11:36:07.488499 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11658, length 40
11:36:07.488743 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11658, length 40
11:36:08.490590 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11661, length 40
11:36:08.490764 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11661, length 40
11:36:09.491648 IP 192.168.1.191 > 192.168.20.7: ICMP echo request, id 6, seq 11664, length 40
11:36:09.491889 IP 192.168.20.7 > 192.168.1.191: ICMP echo reply, id 6, seq 11664, length 40
11:36:10.399253 IP 192.168.20.7.57303 > 192.168.1.1.53: UDP, length 37
11:36:10.722106 IP 192.168.1.1.53 > 192.168.20.7.57303: UDP, length 103
11:36:10.722473 IP 192.168.20.7.32781 > 192.168.1.1.53: UDP, length 49
11:36:10.743034 IP 192.168.1.1.53 > 192.168.20.7.32781: UDP, length 115
11:36:10.744939 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:10.744963 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:10.945952 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:10.945993 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:11.146854 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:11.146915 ARP, Request who-has 192.168.20.7 tell 192.168.20.1, length 28
11:36:11.147147 ARP, Reply 192.168.20.7 is-at 7a:f5:5b:ff:c9:c4, length 42
11:36:11.147157 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:11.347851 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:11.347879 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:11.548874 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:11.548950 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:11.749860 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:11.749892 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:11.950968 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:11.951009 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:12.151867 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:12.151908 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:12.352873 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:12.352916 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:12.553878 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:12.553927 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:12.754878 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:12.754921 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:12.955897 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:12.955969 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:13.156900 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:13.156968 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:13.357906 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:13.357972 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:13.558892 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:13.558928 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:13.759896 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:13.759921 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:13.960906 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163
11:36:13.960936 IP 192.168.20.1 > 192.168.20.7: ICMP host 192.168.1.14 unreachable, length 60
11:36:14.161910 IP 192.168.20.7.139 > 192.168.1.14.3514: tcp 163 -
netstat -m
1855/1940/3795 mbufs in use (current/cache/total)
1438/338/1776/26368 mbuf clusters in use (current/cache/total/max)
1438/333 mbuf+clusters out of packet secondary zone in use (current/cache)
0/120/120/13184 4k (page size) jumbo clusters in use (current/cache/total/max)
0/0/0/3906 9k jumbo clusters in use (current/cache/total/max)
0/0/0/2197 16k jumbo clusters in use (current/cache/total/max)
3352K/1641K/4993K bytes allocated to network (current/cache/total)
0/0/0 requests for mbufs denied (mbufs/clusters/mbuf+clusters)
0/0/0 requests for mbufs delayed (mbufs/clusters/mbuf+clusters)
0/0/0 requests for jumbo clusters delayed (4k/9k/16k)
0/0/0 requests for jumbo clusters denied (4k/9k/16k)
0/10/6656 sfbufs in use (current/peak/max)
0 requests for sfbufs denied
0 requests for sfbufs delayed
0 requests for I/O initiated by sendfileI also did service netif restart and then no traffic on any interface worked so I had to reboot again.
-
1.1 is the router itself
1.3 is a virtual ip
2.21 is a virtual ip192.168.1.3/32 LAN IP Alias Virtual IP for wpad.malmberg.fi
192.168.2.21/32 LAN IP Alias Virtual IP for wiki.malmberg.fiSo you're playing games with multiple Layer 3 networks on VLAN 5 and you are having problems. Perhaps don't do silly things like that. Makes me wonder what other questionable design decisions you have made elsewhere. Seems they are coming home to roost. What kind of switch are you using? If you post more packet captures please indicate where they were taken and how.