WAN link going down
-
I'm not sure if this relates but it happened at about the time the WAN came back to life. webgui access was slow so I had opened a new SSH to pfSense and restarted php and webgui (options 16 & 11). I was packet capturing igb4 when it came back up, perhaps the answer lies in here somewhere????
[2.2-RELEASE][admin@pfsense.irj972.local.lan]/root: tcpdump -i igb4 -e\ tcpdump: verbose output suppressed, use -v or -vv for full protocol decode\ listening on igb4, link-type EN10MB (Ethernet), capture size 65535 bytes\ 10:54:06.082443 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:54:08.334709 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:08.382180 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 358: 10.27.136.1.bootps > 86.5.163.20.bootpc: BOOTP/DHCP, Reply, length 316\ 10:54:10.414556 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:10.431928 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 358: 10.27.136.1.bootps > 86.5.163.20.bootpc: BOOTP/DHCP, Reply, length 316\ 10:54:10.445186 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.20 tell 86.5.163.20, length 28\ 10:54:10.526505 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:10.533724 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:10.533755 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.60949 > 199.7.83.42.domain: 1572% [1au] NS? . (28)\ 10:54:10.556539 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 955: 199.7.83.42.domain > 86.5.163.20.60949: 1572*- 14/0/25 NS a.root-servers.net., NS b.root-servers.net., NS c.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS g.root-servers.net., NS h.root-servers.net., NS i.root-servers.net., NS j.root-servers.net., NS k.root-servers.net., NS l.root-servers.net., NS m.root-servers.net., RRSIG (913)\ 10:54:10.958970 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 83: 86.5.163.20.27346 > 10.6.0.1.domain: 3982+ PTR? 1.163.5.86.in-addr.arpa. (41)\ 10:54:11.471532 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 45315, length 60\ 10:54:11.573864 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.53673 > 128.63.2.53.domain: 16340% [1au] NS? . (28)\ 10:54:11.670936 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 955: 128.63.2.53.domain > 86.5.163.20.53673: 16340*- 14/0/25 NS a.root-servers.net., NS b.root-servers.net., NS c.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS g.root-servers.net., NS h.root-servers.net., NS i.root-servers.net., NS j.root-servers.net., NS k.root-servers.net., NS l.root-servers.net., NS m.root-servers.net., RRSIG (913)\ 10:54:11.671566 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.52571 > 128.63.2.53.domain: 57284% [1au] DNSKEY? . (28)\ 10:54:11.766351 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 778: 128.63.2.53.domain > 86.5.163.20.52571: 57284*- 3/0/1 DNSKEY, DNSKEY, RRSIG (736)\ 10:54:12.471524 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 45571, length 60\ 10:54:13.532080 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 45827, length 60\ 10:54:14.571331 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 46083, length 60\ 10:54:15.593151 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:15.600351 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:15.600366 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 46339, length 60\ 10:54:16.037663 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 83: 86.5.163.20.11119 > 208.67.222.222.domain: 3982+ PTR? 1.163.5.86.in-addr.arpa. (41)\ 10:54:20.598352 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:20.730431 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:21.787229 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:23.893674 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:23.933139 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 358: 10.27.136.1.bootps > 86.5.163.20.bootpc: BOOTP/DHCP, Reply, length 316\ 10:54:23.946232 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.20 tell 86.5.163.20, length 28\ 10:54:24.894081 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:24.899870 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:24.899886 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 48643, length 60\ 10:54:25.075941 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.7830 > 199.7.91.13.domain: 5900% [1au] NS? . (28)\ 10:54:25.104182 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 955: 199.7.91.13.domain > 86.5.163.20.7830: 5900*- 14/0/25 NS j.root-servers.net., NS a.root-servers.net., NS l.root-servers.net., NS b.root-servers.net., NS c.root-servers.net., NS i.root-servers.net., NS e.root-servers.net., NS g.root-servers.net., NS d.root-servers.net., NS k.root-servers.net., NS h.root-servers.net., NS m.root-servers.net., NS f.root-servers.net., RRSIG (913)\ 10:54:25.104697 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.14951 > 193.0.14.129.domain: 12171% [1au] DNSKEY? . (28)\ 10:54:25.119198 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 778: 193.0.14.129.domain > 86.5.163.20.14951: 12171*- 3/0/1 DNSKEY, DNSKEY, RRSIG (736)\ 10:54:25.354855 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 84: 86.5.163.20.8647 > 10.6.0.1.domain: 64149+ PTR? 13.91.7.199.in-addr.arpa. (42)\ 10:54:25.895069 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 48899, length 60\ 10:54:26.896673 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 49155, length 60\ 10:54:27.897081 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 49411, length 60\ 10:54:28.898080 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:28.904480 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:28.904489 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 49667, length 60\ 10:54:29.232433 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:54:32.322647 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:54:34.087494 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:35.093240 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:35.412984 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:54:37.147264 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:37.186480 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 358: 10.27.136.1.bootps > 86.5.163.20.bootpc: BOOTP/DHCP, Reply, length 316\ 10:54:37.200013 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.20 tell 86.5.163.20, length 28\ 10:54:38.209533 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:38.215685 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:38.215702 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 51971, length 60\ 10:54:38.305335 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.16065 > 192.33.4.12.domain: 48610% [1au] NS? . (28)\ 10:54:38.325506 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 955: 192.33.4.12.domain > 86.5.163.20.16065: 48610*- 14/0/25 NS m.root-servers.net., NS a.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS h.root-servers.net., NS l.root-servers.net., NS c.root-servers.net., NS j.root-servers.net., NS g.root-servers.net., NS b.root-servers.net., NS i.root-servers.net., NS k.root-servers.net., NS d.root-servers.net., RRSIG (913)\ 10:54:38.325974 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.14029 > 128.63.2.53.domain: 49826% [1au] DNSKEY? . (28)\ 10:54:38.419966 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 778: 128.63.2.53.domain > 86.5.163.20.14029: 49826*- 3/0/1 DNSKEY, DNSKEY, RRSIG (736)\ 10:54:38.618358 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 84: 86.5.163.20.26250 > 10.6.0.1.domain: 43443+ PTR? 12.4.33.192.in-addr.arpa. (42)\ 10:54:39.271518 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 52227, length 60\ 10:54:40.296688 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 52483, length 60\ 10:54:41.331078 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 52739, length 60\ 10:54:42.345078 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:42.352900 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:42.352909 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 52995, length 60\ 10:54:47.209071 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:47.508734 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:51.682477 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:54:51.724021 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 358: 10.27.136.1.bootps > 86.5.163.20.bootpc: BOOTP/DHCP, Reply, length 316\ 10:54:51.737032 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.20 tell 86.5.163.20, length 28\ 10:54:52.773536 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:52.780237 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:52.780255 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 55555, length 60\ 10:54:52.866051 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.40876 > 128.63.2.53.domain: 42576% [1au] NS? . (28)\ 10:54:52.959730 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 955: 128.63.2.53.domain > 86.5.163.20.40876: 42576*- 14/0/25 NS a.root-servers.net., NS b.root-servers.net., NS c.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS g.root-servers.net., NS h.root-servers.net., NS i.root-servers.net., NS j.root-servers.net., NS k.root-servers.net., NS l.root-servers.net., NS m.root-servers.net., RRSIG (913)\ 10:54:52.960371 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.52067 > 192.5.5.241.domain: 24293% [1au] DNSKEY? . (28)\ 10:54:52.979001 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 778: 192.5.5.241.domain > 86.5.163.20.52067: 24293*- 3/0/1 DNSKEY, DNSKEY, RRSIG (736)\ 10:54:53.126863 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 84: 86.5.163.20.63969 > 10.6.0.1.domain: 20882+ PTR? 241.5.5.192.in-addr.arpa. (42)\ 10:54:53.835519 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 55811, length 60\ 10:54:54.897520 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 56067, length 60\ 10:54:54.972477 0c:c4:7a:07:d3:4c (oui Unknown) > 33:33:00:01:00:02 (oui Unknown), ethertype IPv6 (0x86dd), length 98: fe80::ec4:7aff:fe07:d34c.dhcpv6-client > ff02::1:2.dhcpv6-server: dhcp6 inf-req\ 10:54:55.908083 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 56323, length 60\ 10:54:56.909075 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:54:56.916953 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:54:56.916962 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 56579, length 60\ 10:55:01.652612 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:55:01.840345 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:55:01.948237 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:55:04.742625 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:55:05.984245 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 342: 86.5.163.20.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:22:68:1f:74:81 (oui Unknown), length 300\ 10:55:06.022854 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 358: 10.27.136.1.bootps > 86.5.163.20.bootpc: BOOTP/DHCP, Reply, length 316\ 10:55:06.036054 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.20 tell 86.5.163.20, length 28\ 10:55:06.984083 00:22:68:1f:74:81 (oui Unknown) > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 86.5.163.1 tell 86.5.163.20, length 28\ 10:55:06.990445 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 86.5.163.1 is-at 00:21:55:cb:93:da (oui Unknown), length 46\ 10:55:06.990457 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 59139, length 60\ 10:55:07.102458 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.58188 > 199.7.83.42.domain: 7978% [1au] NS? . (28)\ 10:55:07.125399 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 955: 199.7.83.42.domain > 86.5.163.20.58188: 7978*- 14/0/25 NS a.root-servers.net., NS b.root-servers.net., NS c.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS g.root-servers.net., NS h.root-servers.net., NS i.root-servers.net., NS j.root-servers.net., NS k.root-servers.net., NS l.root-servers.net., NS m.root-servers.net., RRSIG (913)\ 10:55:07.125964 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.24946 > 199.7.83.42.domain: 49091% [1au] DNSKEY? . (28)\ 10:55:07.148634 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 778: 199.7.83.42.domain > 86.5.163.20.24946: 49091*- 3/0/1 DNSKEY, DNSKEY, RRSIG (736)\ 10:55:07.984076 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 59395, length 60\ 10:55:08.984082 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 59651, length 60\ 10:55:09.984414 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 59907, length 60\ 10:55:11.022775 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 60163, length 60\ 10:55:12.084530 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 60419, length 60\ 10:55:13.145076 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 60675, length 60\ 10:55:14.207515 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 60931, length 60\ 10:55:15.226327 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 61187, length 60\ 10:55:16.230240 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 61443, length 60\ 10:55:17.292500 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 61699, length 60\ 10:55:18.293059 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 61955, length 60\ 10:55:19.293496 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 62211, length 60\ 10:55:20.295718 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 62467, length 60\ 10:55:21.351634 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 62723, length 60\ 10:55:22.413512 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 62979, length 60\ 10:55:23.475509 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 63235, length 60\ 10:55:24.537513 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 63491, length 60\ 10:55:25.544002 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 63747, length 60\ 10:55:26.106484 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 70: 86.5.163.20.16425 > a.root-servers.net.domain: 23585% [1au] NS? . (28)\ 10:55:26.137378 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 955: a.root-servers.net.domain > 86.5.163.20.16425: 23585*- 14/0/25 NS a.root-servers.net., NS b.root-servers.net., NS c.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS g.root-servers.net., NS h.root-servers.net., NS i.root-servers.net., NS j.root-servers.net., NS k.root-servers.net., NS l.root-servers.net., NS m.root-servers.net., RRSIG (913)\ 10:55:26.412333 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 83: 86.5.163.20.42748 > 10.6.0.1.domain: 65077+ PTR? 4.0.41.198.in-addr.arpa. (41)\ 10:55:26.606516 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 64003, length 60\ 10:55:27.668507 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 64259, length 60\ 10:55:27.892905 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:55:28.709068 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 64515, length 60\ 10:55:29.711533 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 64771, length 60\ 10:55:30.713178 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 65027, length 60\ 10:55:30.982770 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:55:31.475156 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 83: 86.5.163.20.44796 > 208.67.222.222.domain: 65077+ PTR? 4.0.41.198.in-addr.arpa. (41)\ 10:55:31.495504 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 115: 208.67.222.222.domain > 86.5.163.20.44796: 65077 1/0/0 PTR a.root-servers.net. (73)\ 10:55:31.713176 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 65283, length 60\ 10:55:32.775509 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 4, length 60\ 10:55:33.837509 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 260, length 60\ 10:55:34.072969 0c:c4:7a:07:d3:4c (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 590: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 0c:c4:7a:07:d3:4c (oui Unknown), length 548\ 10:55:34.899509 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 516, length 60\ 10:55:35.922444 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 772, length 60\ 10:55:36.922440 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 1028, length 60\ 10:55:37.960272 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 1284, length 60\ 10:55:39.010335 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 1540, length 60\ 10:55:40.072519 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 1796, length 60\ 10:55:40.936545 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 82: 86.5.163.20.56601 > 10.6.0.1.domain: 10077+ A? 0.pfsense.pool.ntp.org. (40)\ 10:55:41.105518 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 2052, length 60\ 10:55:42.167500 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 2308, length 60\ 10:55:43.229516 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 2564, length 60\ 10:55:44.230233 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 2820, length 60\ 10:55:45.250323 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 3076, length 60\ 10:55:46.036645 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 82: 86.5.163.20.39144 > 208.67.222.222.domain: 10077+ A? 0.pfsense.pool.ntp.org. (40)\ 10:55:46.074178 00:21:55:cb:93:da (oui Unknown) > 00:22:68:1f:74:81 (oui Unknown), ethertype IPv4 (0x0800), length 146: 208.67.222.222.domain > 86.5.163.20.39144: 10077 4/0/0 A 5.83.190.253, A 213.199.225.30, A 77.66.33.146, A 87.106.176.225 (104)\ 10:55:46.074309 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 82: 86.5.163.20.44752 > 10.6.0.1.domain: 55072+ AAAA? 0.pfsense.pool.ntp.org. (40)\ 10:55:46.293444 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 3332, length 60\ 10:55:47.355518 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 3588, length 60\ 10:55:48.417516 00:22:68:1f:74:81 (oui Unknown) > 00:21:55:cb:93:da (oui Unknown), ethertype IPv4 (0x0800), length 94: 86.5.163.20 > 10.4.0.1: ICMP echo request, id 130, seq 3844, length 60\ ^C\ 151 packets captured\ 151 packets received by filter\ 0 packets dropped by kernel\ [2.2-RELEASE][admin@pfsense.irj972.local.lan]/root:}
-
Hi, update from this side of the water ;D
Today (after 3 days without a problem) it occured again.
netstat-nr output attached, as well as the sysctl dev.em.1. I didn't reboot yet, but I switched to a different fw with 2.1.5. (still have the 2.2 around but can't continue losing connection at random times) Other logs are still available, I have not rebooted the 2.2 firewall yet.
I also think it has something to do with the dhcp discovery not working correct. (or different from 2.1.5)
My setup is also: cable modem <-> pfsense. (but in Belgium, provider: Telenet)
Any advice as to what a logical next step would be?
-
Good point, thanks for reminding me. During my most recent issue I tried plugging my modem into a working and previously in service 2.1.5 box on identical hardware (supermicro a1srm-2758f) which also failed to obtain a WAN IP address. I didn't test this as extensively as my 2.2 as time was pushing on by then.
-
@irj972:
Good point, thanks for reminding me. During my most recent issue I tried plugging my modem into a working and previously in service 2.1.5 box on identical hardware (supermicro a1srm-2758f) which also failed to obtain a WAN IP address. I didn't test this as extensively as my 2.2 as time was pushing on by then.
Hm, strange. On my end, as soon as I switch my WAN cable to the 2.1.5 box, that 2.1.5 box gets an IP immediately.
-
Next time it drops I'll try again to verify, possibly my fiddling influenced something?
If I purchase gold, would this get further attention? I need this system reliable for some upcoming work where I'll need to be able to vpn back in to my home office. -
I checked the 2.2 now, after leaving it unplugged from WAN for a night. Plugged in the WAN but it still didn't get an IP.
The only thing I see is dhcp requests, the 2.1.5 on that same network (we get multiple IPs from the isp via dhcp) works without a problem.
On the 2.2 this was the tcpdump on the WAN interface:
08:36:46.129955 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:0d:88:cc:fa:2e, length 300 08:36:48.519874 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:0d:88:cc:fa:2e, length 300 08:36:52.380571 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:0d:88:cc:fa:2e, length 300 ...
After a reboot, it got an IP just fine.. I'm seeing the same behavior on another firewall, remote this one, so we're holding off updating to 2.2 for now. :-\
Kristof.
-
Packet capture on a mirror port upstream of WAN. Identify the difference between the DHCP requests before and after reboot. Submit findings as a bug report.
-
Is packet capture on the firewall itself ok also? (I don't have a very intelligent switch on that end)
Kristof
-
I would say, considering what you're asserting, no. Capturing on the interface is not okay.
Just because a packet capture on WAN captures something doesn't mean it was actually sent on the wire.
Eliminate all doubt and capture on the switch. Then you KNOW.
-
Though capturing on the WAN interface and comparing with 2.1.5 will tell you something. If they're identical then try and capture upstream to see if they're different at that point. That tells you where the change is occurring.
Steve
-
so following my latest WAN drop, I did a bit more investigating. I believe I have found a way to force the WAN dropping issue. I don't have a switch to capture on unfortunately, my system is simple , i.e broadband modem -> pfsense 2.2.
this is what Ive discovered,
If I power my modem up, let it sync with the Virgin media network and then connect my pfsense WAN interface I get a DHCP address immediately. I can then unplug either coaxial or cat5 WAN cables and pfsense still gets DHCP immediately.
If I connect my WAN interface before I power up my modem, when it syncs I do not get a DHCP address but see the repeating pattern of DHCP hunting.I believe something like my broadband line dropping or virgin lease expiration forces this type of reset and hence pfSense does not see a DHCP address.
I'd like to do a packet capture of my WAN interface in both modes, one showing immediate DHCP allocation and one showing the looping error so somebody with greater knowledge could review and and raise a bug if its appropriate.
Is there a preferred format or command line to capture WAN interface data, I'd like to ensure I get everything thats needed. -
I was away for a while but upon returning have updated our 2.2 to 2.2.1-RELEASE.
This was 4 days ago and since then we've not seen any issues. (doesn't mean anything yet, but I'm hopeful) I've got tcpdump running to make sure I catch anything weird if it occurs. To be sure it's okay I think I need to give it 3-4 weeks.
@irj972, I'm not sure what the requested tcpdump parameters are but I use these:```
tcpdump -i em1 -nnvvXSs 1514 -
I recently did a new full install (after /etc/ got corrupted due to bad power off) and I haven't had the WAN link loss issue.
But as irj972 stated, when pfsense is booted before the modem is booted it fails to get a IP addresss, i've also noticed this.
-
I recently did a new full install (after /etc/ got corrupted due to bad power off) and I haven't had the WAN link loss issue.
Thanks for the update. And are you now running 2.2.1 or still 2.2 ?
-
I recently did a new full install (after /etc/ got corrupted due to bad power off) and I haven't had the WAN link loss issue.
Thanks for the update. And are you now running 2.2.1 or still 2.2 ?
2.2.1-RELEASE (i386)
built on Fri Mar 13 08:16:53 CDT 2015
FreeBSD 10.1-RELEASE-p6You're welcome ;)
-
I keep losing my ip on the WAN interface. (connected to switch, and that connects to the cable modem of business TELENET in Belgium)
As soon as this happens I get these (repeating) requests on the WAN interface of the DHCP interface:
16:39:41.829043 IP (tos 0x10, ttl 128, id 0, offset 0, flags [none], proto UDP (17), length 328) 0.0.0.0.68 > 255.255.255.255.67: [udp sum ok] BOOTP/DHCP, Request from 00:0d:88:cc:XX:XX, length 300, xid 0x304889c7, Flags [none] (0x0000) Client-Ethernet-Address 00:0d:88:cc:XX:XX Vendor-rfc1048 Extensions Magic Cookie 0x63825363 DHCP-Message Option 53, length 1: Discover Requested-IP Option 50, length 4: 81.82.XX.YY Client-ID Option 61, length 7: ether 00:0d:88:cc:XX:XX Hostname Option 12, length 7: "pfsense" Parameter-Request Option 55, length 9: Subnet-Mask, BR, Time-Zone, Classless-Static-Route Default-Gateway, Domain-Name, Domain-Name-Server, Hostname Option 119 0x0000: 4510 0148 0000 0000 8011 3996 0000 0000 E..H......9..... 0x0010: ffff ffff 0044 0043 0134 4260 0101 0600 .....D.C.4B`.... 0x0020: 3048 89c7 0000 0000 0000 0000 0000 0000 0H.............. 0x0030: 0000 0000 0000 0000 000d 88cc fa2f 0000 ............./.. 0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0050: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0060: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0070: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0080: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0090: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00b0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00c0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00d0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00e0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00f0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0100: 0000 0000 0000 0000 6382 5363 3501 0132 ........c.Sc5..2 0x0110: 0451 52d1 2c3d 0701 000d 88cc fa2f 0c07 .QR.,=......./.. 0x0120: 7066 7365 6e73 6537 0901 1c02 7903 0f06 pfsense7....y... 0x0130: 0c77 ff00 0000 0000 0000 0000 0000 0000 .w.............. 0x0140: 0000 0000 0000 0000 ........
But no reply from upstream. However, this literally never happens with 2.1.5. The firewall with 2.2.1 (before 2.2) was a fresh install.
I have now re-enabled IPv6 (but not actively using it) on our pfsense WAN interface, our provider also hands out IPv6 addresses. I don't expect this to change anything but still.
Any suggestions on how to get the right stuff to the developers so there might be a fix for this?
Regards,
Kristof. -
Hi xTofh
Telenet is working on their infrastructure, maybe this could explain the loss off connection ?
Also I don't use IPv6 and i'm not facing these problems (Telenet Whoppa) -
Spoke too soon … lost my wan again, after starting a vpn connection, will add more details when i get home
:Update:
My HDD crashed ... thank god for backups ;D
After swapping the HDD, everything is working fine again -
OP's issue was confirmed resolved, a dead hard drive was the cause.
Locking this thread after splitting out the hijacking since adding to 5 pages of unrelated history isn't going to be helpful to find a resolution to unrelated problems.