Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 12 May 2009 14:11:52 -0700
From:      Chris Cowart <ccowart@rescomp.berkeley.edu>
To:        Ricardo Augusto de Souza <ricardo.souza@cmtsp.com.br>
Cc:        "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>
Subject:   Re: RES: Cant setup carp as BACKUP
Message-ID:  <20090512211152.GC49013@hal.rescomp.berkeley.edu>
In-Reply-To: <E85141A51657B14A981D1FF0E65F72465DB8A1FFEB@EXVS04.corpmail.net>
References:  <E85141A51657B14A981D1FF0E65F72465DB8A1FF7E@EXVS04.corpmail.net> <E85141A51657B14A981D1FF0E65F72465DB8A1FFEB@EXVS04.corpmail.net>

next in thread | previous in thread | raw e-mail | index | archive | help

--dkEUBIird37B8yKS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Ricardo Augusto de Souza wrote:
> Anyone know how do i 'force' a carp to be backup?
> I set a advskew higher than the master but it comes up as master.

Is there a host-based or network-based firewall blocking the carp
protocol?=20

In ipfw, you would need:

/sbin/ipfw add allow carp from $SOME_IP to 224.0.0.18 in via $SOME_INT

For me:

| ccowart wifi-aux-1 / $ ifconfig vlan91
| vlan91: flags=3D8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metr=
ic 0 mtu 1500
|         options=3D3<RXCSUM,TXCSUM>
|         ether 00:1d:09:29:a7:f5
|         inet 10.9.64.2 netmask 0xfffff000 broadcast 10.9.79.255
|         media: Ethernet autoselect (1000baseTX <full-duplex>)
|         status: active
|         vlan: 91 parent interface: bce1
| ccowart wifi-aux-1 / $ ifconfig carp11=20
| carp11: flags=3D49<UP,LOOPBACK,RUNNING> metric 0 mtu 1500
|         inet 10.9.64.1 netmask 0xffffffff=20
|         carp: BACKUP vhid 11 advbase 1 advskew 100
| ccowart wifi-aux-1 / $ ifconfig carp21
| carp21: flags=3D49<UP,LOOPBACK,RUNNING> metric 0 mtu 1500
|         inet 10.9.64.1 netmask 0xffffffff=20
|         carp: MASTER vhid 21 advbase 1 advskew 0
| ccowart wifi-aux-1 / $ sudo tcpdump -i vlan91 proto carp
| tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
| listening on vlan91, link-type EN10MB (Ethernet), capture size 96 bytes
| 14:06:36.009984 IP 10.9.64.3 > VRRP.MCAST.NET: VRRPv2, Advertisement, vri=
d=20
|   11, prio 0, authtype none, intvl 1s, length 36
| 14:06:36.143937 IP 10.9.64.2 > VRRP.MCAST.NET: VRRPv2, Advertisement, vri=
d=20
|   21, prio 0, authtype none, intvl 1s, length 36
| 14:06:37.012025 IP 10.9.64.3 > VRRP.MCAST.NET: VRRPv2, Advertisement, vri=
d=20
|   11, prio 0, authtype none, intvl 1s, length 36
| 14:06:37.146003 IP 10.9.64.2 > VRRP.MCAST.NET: VRRPv2, Advertisement, vri=
d=20
|   21, prio 0, authtype none, intvl 1s, length 36

Use tcpdump on your parent interfaces to see if you're seeing the
multicast traffic. Make sure your firewalls allow this traffic.

--=20
Chris Cowart
Network Technical Lead
Network & Infrastructure Services, RSSP-IT
UC Berkeley

--dkEUBIird37B8yKS
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.10 (FreeBSD)

iQIcBAEBAwAGBQJKCeYYAAoJEIGh6j3cHUNPMaYQAMLbqvqZ648q/zGgSJx928CR
uEUCSjAoLxo4bSJ7t7Lkq43D/MElpQI0dFAsGDwLdM6H7wUUC4tyO8EAHykodN4N
kgzixSvVlEFp0QNahzSkuyIMel+zX8Z+wvYpxxYXTP8o7xE38lXTZDpCpJjVzRy/
uWAPN/wvUnBvkX00hJ9NKPDLV7JwbyGh9+E6LTo07/Bk+vnk7wbm3zaDMpl38aOf
+0NWDTEdAJHketyqSwuAOJp5nyh2lktQCNVj6o/yjH4lvVemnY5+/E/v/e8ruo/9
hEWqRDBk/h6sQToAKjOC0hoCS5GXEPKeuH84KNl/VIHJ1D6N1weDwo2iju2H541d
hcXAWqBWtJtH9jKg8wr+PM92SIouAyV+FksOvSnHW9eVZt+H9lWzVNscYc0Qvztg
SP7+xpeFVkztNRpXw/5BJWBE3jusGUjsLePo6CmH3T8KaL4qkUpRUf4TpqJNzN/6
LPd62kYANV3Wzr7G9dhRoYH1DYvbXi0TamgYtXYN1iSLtr3oiSrwthEDo4ko5zGW
+ZFy9GiUwScLkYRrl2fQTA3Bsd0Gzp0r5/D040kQIAzUaAbeYeVRJnYiN2AFkutK
P7K15RnZe9Vi8rIoxXOE83CPGIwisrmh4hzUcR2DjUUzSHwlfNpv/K3RZbYoQKkD
u9wcbpGhq9wkxwc3/5DZ
=nL+6
-----END PGP SIGNATURE-----

--dkEUBIird37B8yKS--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090512211152.GC49013>