Quantcast
Viewing all articles
Browse latest Browse all 20028

ARP issue?

I have a VLAN setup with a trunk separating my WAN and LAN on the same eth0 physical circuit, this circuit is connected to a TP-Link T5-Port Gigabit Ethernet Easy Smart Switch (TL-SG105E).  I noticed while pinging either of the 2 devices on the LAN VLAN (eth0 vif 101) that once in a while an ARP request is happening from the Edge I briefly lose ping connectivity. No problems on the WAN VLAN side.

 

Edge Config:

eth0 is trunk

eth0.100 is WAN

eth0.101 is LAN

computer pinging attached to switch0

 

VLAN LAN IP range is 192.168.194.1/24

switch0 LAN IP range is 192.168.192.1/24 <-- pinging from here

 

Switch Config:

Port 1 - Tagged to eth0 on EdgeRouter

Port 2 - Untagged VLAN 100 

Port 3-5 - Untagged VLAN 101

 

So I'll be pinging

 

Reply from 192.168.194.102: bytes=32 time<1ms TTL=63
Request timed out.
Request timed out.
Request timed out.
Reply from 192.168.194.102: bytes=32 time=5ms TTL=63

 

Sometimes it will be "destination network unreachable"

 

Reply from 192.168.192.1: Destination host unreachable.
Reply from 192.168.192.1: Destination host unreachable.

 

 

Meanwhile a TCP dump shows this at the same time:

 

15:21:49.149169 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.194.102 tell 192.168.194.1, length 28
15:21:50.141547 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.194.102 tell 192.168.194.1, length 28
15:21:51.141540 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.194.102 tell 192.168.194.1, length 28
15:21:52.150534 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.194.102 tell 192.168.194.1, length 28

 

When pinging from SSH on the Edge the packets always are fine and I get no loss, etc.

 

Any idea why this might be happening? 

 

Here's the config

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group Uptime_Robot {
            address 69.162.124.226
            address 69.162.124.227
            address 69.162.124.228
            address 69.162.124.229
            address 69.162.124.230
            address 69.162.124.231
            address 69.162.124.232
            address 69.162.124.233
            address 69.162.124.234
            address 69.162.124.235
            address 69.162.124.236
            address 69.162.124.237
            address 69.162.124.238
            address 46.137.190.132
            address 122.248.234.23
            address 188.226.183.141
            address 178.62.52.237
            address 54.79.28.129
            address 54.94.142.218
            address 104.131.107.63
            address 54.67.10.127
            address 54.64.67.106
            address 159.203.30.41
            address 46.101.250.135
        }
    }
    ipv6-name WANv6_IN {
        default-action drop
        description "WAN inbound traffic forwarded to LAN"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related sessions"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow IPv6 icmp"
            protocol ipv6-icmp
        }
    }
    ipv6-name WANv6_LOCAL {
        default-action drop
        description "WAN inbound traffic to the router"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related sessions"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow IPv6 icmp"
            protocol ipv6-icmp
        }
        rule 40 {
            action accept
            description "allow dhcpv6"
            destination {
                port 546
            }
            protocol udp
            source {
                port 547
            }
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 1 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action accept
            description "Allow PPTP"
            destination {
                port 1723
            }
            log enable
            protocol tcp
        }
        rule 3 {
            action accept
            description "Allow GRE"
            log enable
            protocol gre
        }
        rule 4 {
            action accept
            description "Allow Uptime Robot ICMP"
            log disable
            protocol icmp
            source {
                group {
                    address-group Uptime_Robot
                }
            }
        }
        rule 6 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        description "Garage VLAN Trunk"
        duplex auto
        poe {
            output off
        }
        speed auto
        vif 100 {
            address dhcp
            description "TWC WAN VLAN"
            dhcpv6-pd {
                pd 0 {
                    interface switch0 {
                    }
                    prefix-length 64
                }
                rapid-commit enable
            }
            firewall {
                in {
                    ipv6-name WANv6_IN
                    name WAN_IN
                }
                local {
                    ipv6-name WANv6_LOCAL
                    name WAN_LOCAL
                }
            }
            traffic-policy {
                out UpStream
            }
        }
        vif 101 {
            address 192.168.194.1/24
            description "Garage LAN VLAN"
            mtu 1500
        }
    }
    ethernet eth1 {
        address 192.168.193.1/24
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth2 {
        description "Switch Uplink"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth3 {
        description "Linen Closet UAP"
        duplex auto
        poe {
            output 24v
        }
        speed auto
    }
    ethernet eth4 {
        description "Family Room UAP"
        duplex auto
        poe {
            output 24v
        }
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.192.1/24
        description Switch
        ipv6 {
            dup-addr-detect-transmits 1
            router-advert {
                cur-hop-limit 64
                link-mtu 0
                managed-flag true
                max-interval 600
                other-config-flag true
                prefix ::/64 {
                    autonomous-flag true
                    on-link-flag true
                    valid-lifetime 2592000
                }
                reachable-time 0
                retrans-timer 0
                send-advert true
            }
        }
        mtu 1500
        switch-port {
            interface eth2
            interface eth3
            interface eth4
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface switch0
    rule 1 {
        description cam1
        forward-to {
            address 192.168.192.95
            port 80
        }
        original-port 9015
        protocol tcp
    }
    rule 2 {
        description cam2
        forward-to {
            address 192.168.192.96
            port 80
        }
        original-port 9016
        protocol tcp
    }
    rule 3 {
        description rdp
        forward-to {
            address 192.168.192.10
            port 3389
        }
        original-port 9833
        protocol tcp_udp
    }
    wan-interface eth0.100
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN_BR {
            authoritative disable
            subnet 192.168.192.0/24 {
                default-router 192.168.192.1
                dns-server 192.168.192.1
                dns-server 4.2.2.1
                lease 86400
                start 192.168.192.100 {
                    stop 192.168.192.200
                }
                static-mapping Mikes_XPS {
                    ip-address 192.168.192.10
                    mac-address C8:1F:66:AD:1D:68
                }
                static-mapping iMac {
                    ip-address 192.168.192.11
                    mac-address ec:35:86:55:87:2c
                }
                unifi-controller 208.78.220.137
            }
        }
        shared-network-name LAN_ETH1 {
            authoritative disable
            subnet 192.168.193.0/24 {
                default-router 192.168.193.1
                dns-server 192.168.193.1
                dns-server 4.2.2.1
                lease 86400
                start 192.168.193.100 {
                    stop 192.168.193.200
                }
            }
        }
        shared-network-name LAN_VLAN {
            authoritative disable
            subnet 192.168.194.0/24 {
                default-router 192.168.194.1
                dns-server 4.2.2.1
                dns-server 8.8.8.8
                lease 86400
                start 192.168.194.100 {
                    stop 192.168.194.200
                }
            }
        }
    }
    dns {
        dynamic {
            interface eth0.100 {
                service dyndns {
                    host-name **
                    login **
                    password ****************
                    server dynupdate.no-ip.com
                }
            }
        }
        forwarding {
            cache-size 750
            listen-on switch0
            listen-on eth1
            listen-on eth0.101
        }
    }
    gui {
        https-port 443
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0.100
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    ubnt-discover {
        disable
    }
    upnp {
        listen-on switch0 {
            outbound-interface eth0.100
        }
    }
}
system {
    host-name wd-ubnt-em5p
    login {
        user admin {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        ipsec enable
        ipv4 {
            forwarding enable
            pppoe enable
            vlan enable
        }
        ipv6 {
            forwarding enable
            pppoe disable
            vlan enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/Los_Angeles
    traffic-analysis {
        dpi enable
        export enable
    }
}
traffic-policy {
    shaper UpStream {
        bandwidth 25mbit
        class 10 {
            bandwidth 30%
            burst 15k
            ceiling 100%
            description Elastix
            match addr {
                ip {
                    source {
                        address 192.168.192.5/32
                    }
                }
            }
            priority 7
            queue-type fair-queue
        }
        default {
            bandwidth 100%
            burst 15k
            ceiling 100%
            priority 2
            queue-type fair-queue
        }
        description "UpStream QoS policy"
    }
}
vpn {
    pptp {
        remote-access {
            authentication {
                local-users {
                    username *********** {
                        password ****************
                    }
                }
                mode local
            }
            client-ip-pool {
                start 192.168.192.240
                stop 192.168.192.250
            }
            dns-servers {
                server-1 4.2.2.1
                server-2 8.8.8.8
            }
            mtu 1492
        }
    }
}

 

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles