ARP request from router and monitoring server

aychprox

Renowned Member
Oct 27, 2015
76
7
73
Hi,

I saw latest release of pve-firewall (3.0-19) is equipped with ebtables: add arp filtering.

My cluster running in multicast mode and no VLAN implemented from my upstream router. Host and vm network using openvswitch with different physical interfaces.

Issue:
When using iptraf-ng either from host or VM, we can see a lot of arp request which generate incoming traffic about 100kb/s, it looks like some sort of arp flood:

ARP request for 43.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1
UDP (78 bytes) from 169.**MASK** to 169.**MASK** on vmbr1
ARP request for 43.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1
ARP request for 103.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1 ARP request for 10.**MASK** (46 bytes) from 74:d4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1 ARP request for 43.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1 ARP request for 103.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1

Mainly this arp request come from router and zabbix server.
Although we drop at host and vm level using arptable and iptables, but incoming arp still persists and hit to host and vm.

May I know how to eliminate this kind of issue by using ebtables?
 
Hi,

I saw latest release of pve-firewall (3.0-19) is equipped with ebtables: add arp filtering.

My cluster running in multicast mode and no VLAN implemented from my upstream router. Host and vm network using openvswitch with different physical interfaces.

Issue:
When using iptraf-ng either from host or VM, we can see a lot of arp request which generate incoming traffic about 100kb/s, it looks like some sort of arp flood:

ARP request for 43.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1
UDP (78 bytes) from 169.**MASK** to 169.**MASK** on vmbr1
ARP request for 43.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1
ARP request for 103.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1 ARP request for 10.**MASK** (46 bytes) from 74:d4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1 ARP request for 43.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1 ARP request for 103.**MASK** (46 bytes) from 0c:c4**MASK** to ff:ff:ff:ff:ff:ff on vmbr1

Mainly this arp request come from router and zabbix server.
Although we drop at host and vm level using arptable and iptables, but incoming arp still persists and hit to host and vm.

May I know how to eliminate this kind of issue by using ebtables?


In principle yes but openvswitch does not work with ebtables, but should work if you use linux bridges instead.

The proper way to implement request is to use arptables, e.g.:

Code:
arptables -A INPUT --source-mac 0c:c4:11:22:33:44  -j DROP

Note: the "ebtables" option in Proxmox means only that Proxmox will use ebtables feature internally when defining firewalls for VMs and containers. In your case you have to specify the ebtables commands explicitly.
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!