[ixpmanager] BGP Session stuck in Connect state

DDFR | Samaneh Amini samaneh.amini at ddfr.nl
Thu May 19 13:26:10 IST 2022


Hello,
I have a problem, Bgp session between birdserver and bgp-client stays in Connect. I had configured bird server manually in the past and I know that you must with command "igp table master4;" (in the bgp template of client), refer him the way of finding directly-connected interface route. But I don't see such a configuration in yours. How does yours work?
I can ping from both birdserver and bgp-peer each other. And telnet from birdserver to bgp-peer:179 works but telnet from bgp-peer to birdserver:179 doesn't work.  I'm sure that is not a firewall issue.TCP 3-way handshake of one direction(client:randomPort to Bird:179) is not successful I have captured packets with tcpdump in bird and I see that the SYN packets from my client(192.168.184.4) is received, but no SYN-ACK from bird is sent as reply. If session begins from bird to the client(192.168.184.4:179) I see SYN-ACK and ACK

May I ask you to help me to resolve the issue?


root at bird01-NEW:~# netstat -nltp | grep 179
tcp        0      0 192.168.184.1:179       0.0.0.0:*               LISTEN      2400/bird

*******************************************
root at bird01-NEW:~# ps -ef | grep bird
root        2400       1  0 12:25 ?        00:00:00 /usr/sbin/bird -c /usr/local/etc/bird/bird-rs00-ipv4.conf -s /var/run/bird/bird-rs00-         ipv4.ctl
root        2697    2175  0 12:26 pts/1    00:00:00 grep --color=auto bird

root at bird01-NEW:~# tcpdump -i ens192 host 192.168.184.4 &&  port 179
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens192, link-type EN10MB (Ethernet), capture size 262144 bytes
12:35:06.894079 IP 192.168.184.4.64541 > bird01-NEW.bgp: Flags [S], seq 1259990989, win 16384, options [mss 1950], length 0
12:35:08.898288 IP 192.168.184.4.64541 > bird01-NEW.bgp: Flags [S], seq 1259990989, win 16384, options [mss 1950], length 0
12:35:12.899725 IP 192.168.184.4.64541 > bird01-NEW.bgp: Flags [S], seq 1259990989, win 16384, options [mss 1950], length 0
12:35:13.450636 IP bird01-NEW.53075 > 192.168.184.4.bgp: Flags [S], seq 4069192083, win 64240, options [nop,nop,md5 shared secret not supplied with -M, can't check - de5e7c3156f705570daf560d4e26126c,mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
12:35:13.452216 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 120077824, ack 4069192084, win 16384, options [mss 1460], length 0
12:35:15.449811 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 120077824, ack 4069192084, win 16384, options [mss 1460], length 0
12:35:19.451138 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 120077824, ack 4069192084, win 16384, options [mss 1460], length 0
12:35:20.902836 IP 192.168.184.4.64541 > bird01-NEW.bgp: Flags [S], seq 1259990989, win 16384, options [mss 1950], length 0
12:35:27.453709 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 120077824, ack 4069192084, win 16384, options [mss 1460], length 0
12:35:46.986676 IP bird01-NEW.53075 > 192.168.184.4.bgp: Flags [S], seq 4069192083, win 64240, options [nop,nop,md5 shared secret not supplied with -M, can't check - de5e7c3156f705570daf560d4e26126c,mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
12:35:46.990027 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 2697219754, ack 4069192084, win 16384, options [mss 1460], length 0
12:35:48.987024 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 2697219754, ack 4069192084, win 16384, options [mss 1460], length 0
12:35:52.106596 ARP, Request who-has 192.168.184.4 tell bird01-NEW, length 28
12:35:52.107789 ARP, Reply 192.168.184.4 is-at 54:78:1a:f4:c0:c4 (oui Unknown), length 46
12:35:52.988634 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 2697219754, ack 4069192084, win 16384, options [mss 1460], length 0
12:36:00.991970 IP 192.168.184.4.bgp > bird01-NEW.53075: Flags [S.], seq 2697219754, ack 4069192084, win 16384, options [mss 1460], length 0
12:36:11.376982 IP 192.168.184.4.54255 > bird01-NEW.bgp: Flags [S], seq 3131800043, win 16384, options [mss 1950], length 0
12:36:13.380743 IP 192.168.184.4.54255 > bird01-NEW.bgp: Flags [S], seq 3131800043, win 16384, options [mss 1950], length 0
12:36:17.382021 IP 192.168.184.4.54255 > bird01-NEW.bgp: Flags [S], seq 3131800043, win 16384, options [mss 1950], length 0
12:36:21.619634 IP bird01-NEW.40369 > 192.168.184.4.bgp: Flags [S], seq 3340451196, win 64240, options [nop,nop,md5 shared secret not supplied with -M, can't check - cf33042552b287b450d84c156cf9e594,mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
12:36:21.621677 IP 192.168.184.4.bgp > bird01-NEW.40369: Flags [S.], seq 1339172962, ack 3340451197, win 16384, options [mss 1460], length 0


Met vriendelijke groet,


Samaneh Amini

Netwerkengineer     ma, di, wo, do, vr aanwezig
[DDFR-handtekening verkort]

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.inex.ie/pipermail/ixpmanager/attachments/20220519/40f457fc/attachment-0001.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 16213 bytes
Desc: image001.png
URL: <https://www.inex.ie/pipermail/ixpmanager/attachments/20220519/40f457fc/attachment-0001.png>


More information about the ixpmanager mailing list