Date: Tue, 22 May 2007 07:03:16 +0200 From: Ian FREISLICH <ianf@clue.co.za> To: Sten Spans <sten@blinkenlights.nl> Cc: freebsd-current@freebsd.org Subject: Re: em0 hijacking traffic to port 623 Message-ID: <E1HqMWi-0000Tk-2X@clue.co.za> In-Reply-To: Message from Sten Spans <sten@blinkenlights.nl> of "Tue, 22 May 2007 00:21:36 %2B0200." <Pine.LNX.4.64.0705220019390.17702@zaphod.blinkenlights.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
Sten Spans wrote: > On Mon, 21 May 2007, Ian FREISLICH wrote: > > > Hi > > > > We've noticed an issue on our firewalls where the first em device > > in the system hijacks inbound port 623 tcp and udp. The OS never > > sees this traffic. Interestingly, em1 and em2 do not appear to be > > afflicted by this problem. Some reading I've done points to a > > similar conclusion: > > > > http://blogs.sun.com/shepler/entry/port_623_or_the_mount > > > > I've looked at the bios, but I can't find any settings that remotely > > hint IPMI or RMCP+ or serial-over-lan. > > > > Does anyone know how I can stop the card or system from stealing > > port 623 in hardware or must I just stop using em0 (and/or Intel NICS)? > > Does "ifconfig em0 promisc" help ? > That fixed firmware related vanishing ipv6 packets on fxp and em. They are already in promiscuous mode due to carp. Ian -- Ian Freislich
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E1HqMWi-0000Tk-2X>