Mogamat Abrahams wrote:
Joe <fbsd8@...> writes:


Your 67.205.xx.xx ip address looks like a dynamic ip address that you use dhcp to automatically obtain all the network configuration information needed by your host. Static ip addresses don't work that way. You have to manually configure the static network. If I remember correctly, for a block of 3 assignable ip addresses you need a block of 5 from your provider. The first and last ip address are used to config the network.
This address was provided and I manually configured the nic.
You never said if you have a firewall on your host. The firewall rules maybe dropping unsolicited inbound traffic for those 174 prefixed ip addresses. Try putting a pass all log from that NIC rule or just a log all rule or turn off the firewall all together and see what happens. Verify your NAT is not trying to NAT unsolicited inbound traffic for those 174 prefixed ip addresses.

I had no firewall installed on the machine as we were still setting up and usually only add firewalling last. Here is something interesting though, since compiling a custom kernel and including:

device<><------>pf
device<><------>pflog
nooptions<----->sctp
options><------>VIMAGE
device ><------>epair
device ><------>if_bridge
options><------>NULLFS

#firewall

options         MROUTING                # Multicast routing

options         IPFIREWALL              #firewall
options         IPFIREWALL_VERBOSE      #enable logging to syslogd(8)
options         IPFIREWALL_VERBOSE_LIMIT=100    #limit verbosity
options         IPFIREWALL_DEFAULT_TO_ACCEPT    #allow everything by default
options         IPFIREWALL_FORWARD      #packet destination changes

options         ACCEPT_FILTER_DATA
options         ACCEPT_FILTER_DNS
options         ACCEPT_FILTER_HTTP
options         ZERO_COPY_SOCKETS


My JAILS now both receive and respond to traffic! This was the only change i remember making. Just running on firewall_type="OPEN" and have not even defined any other rules.

So the problem seems solved, however still not sure what fixed it....!! Is NAT a requirement for Jail networking where the default gateway is not on the same subnet as the Jail?


Mogamat Abrahams
It's customary to post your solution as the last post in this thread. Since you have so many kernel options included it would be nice to know which one really made the difference.

BY process of limitation
 nooptions  sctp  problem was fixed in 8.1-release
 device     pf    your not using this firewall
 device     pflog

 options    ACCEPT_FILTER_DATA   These 4 have never been talked about
 options    ACCEPT_FILTER_DNS    before in vnet context. Not likely
 options    ACCEPT_FILTER_HTTP   to have any bearing on your problem.
 options    ZERO_COPY_SOCKETS

Since your problem was happening with both if_bridge/epair and netgraph
vnet networks seems unlikely that
 device   epair
 device   if_bridge
compiled into the kernel has any bearing on your problem.

My money is on
options   MROUTING   # Multicast routing

May I suggest you remove the above kernel options and recompile with modules. If it works then you know what kernel option is the solution to a vnet jail receiving inbound traffic. Then post the if_bridge/epair commands you used to create your vnet/vimage inbound and outbound network. Your solution post provides an answer (solution) for people who search the list email archives who have the same problem. Doing this is how you repay the people who help you on this list.


_______________________________________________
freebsd-jail@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-jail
To unsubscribe, send any mail to "freebsd-jail-unsubscr...@freebsd.org"

Reply via email to