I have bunch of SuperMicro KVM boxes on which we're seeing the behaviour described below:
Boxes have a shared IPMI in a 192.168.0.0/23 subnet, hypervisor host itself at .10 and ipmi at .11.
Host can arp and access the IPMI just fine.
Host is acting as a hypervisor and bridging virtual machines to the same 192.168.0.0/23 over the same physical port on which the IPMI is reached from outside. Virtual machines can reach the hypervisor at .10 and various other destinations inside the 192.168.0.0/23, both inside and outside of the bridge-domain (br0) of the hypervisor. However, for some reason the virtual machines cannot reach the IPMI, they do not receive arp replies from the IPMI. If I try to access the IPMI outside of the hypervisor box, it is reachable as are the VMs. So the problem appears to be localized to the IPMI subsystem/bridging.
Below is the illustration of the logical topology:
For reasons outside of my control there are no vlans involved in this.
So it kind of seems as if the IPMI is somehow filtering frames ingressing on the shared interface from the direction of the bridge-domain. To me this doesn't make all that much sense and I was thinking to suggest using the dedicated IPMI port. But has someone maybe seen something similar before and if so, did you happen to solve this somehow? One option I was thinking on trying is to add /32 route towards the IPMI that points to the router on one of the VMs, as the longest match wins the VM should punt the packet to the router that in turn would forward the packet right back to the hypervisor box but using its own mac address as the source. I suppose for this to work similar /32 route is needed also on the IPMI but as I do not have control to it I have not yet had the chance to try this. Any other suggestions are also welcome.
Thanks for your help/ideas.
Boxes have a shared IPMI in a 192.168.0.0/23 subnet, hypervisor host itself at .10 and ipmi at .11.
Host can arp and access the IPMI just fine.
Host is acting as a hypervisor and bridging virtual machines to the same 192.168.0.0/23 over the same physical port on which the IPMI is reached from outside. Virtual machines can reach the hypervisor at .10 and various other destinations inside the 192.168.0.0/23, both inside and outside of the bridge-domain (br0) of the hypervisor. However, for some reason the virtual machines cannot reach the IPMI, they do not receive arp replies from the IPMI. If I try to access the IPMI outside of the hypervisor box, it is reachable as are the VMs. So the problem appears to be localized to the IPMI subsystem/bridging.
Below is the illustration of the logical topology:
Code:
VM-->br0<--->eth0<--->Physical switch <---> Router
|
|
Shared-ipmi
So it kind of seems as if the IPMI is somehow filtering frames ingressing on the shared interface from the direction of the bridge-domain. To me this doesn't make all that much sense and I was thinking to suggest using the dedicated IPMI port. But has someone maybe seen something similar before and if so, did you happen to solve this somehow? One option I was thinking on trying is to add /32 route towards the IPMI that points to the router on one of the VMs, as the longest match wins the VM should punt the packet to the router that in turn would forward the packet right back to the hypervisor box but using its own mac address as the source. I suppose for this to work similar /32 route is needed also on the IPMI but as I do not have control to it I have not yet had the chance to try this. Any other suggestions are also welcome.
Thanks for your help/ideas.