Colin,
We need more information about your TCPIP stack configuration on IBM Z. Do you have the TCPIP profile that you can send us for our review? Please note that while the PRIROUTER, SECROUTER, and NONROUTER settings are configured for an OSA interface in the TCPIP profile, they are passed to the OSA to enable or disable IP forwarding to the owning LPAR whereas IP forwarding can be enabled in the TCPIP stack via the IPCONFIG DATAGRAMFWD parameter. If NONROUTER is coded, IP forwarding is disabled in the OSA for packets having unknown destinations. Unknown destination means that the target IP address in the packet does not match any home IP address in a TCPIP stack of a LPAR. Otherwise, the OSA will forward the packets to first LPAR with PRIROUTER if available. If that is not avaiable, then the OSA forward the packets to the first LPAR with SECROUTER. Please note that because of the confusion and complexity with the PRIROUTER and SECROUTER settings, IBM recommends using VMAC ROUTEALL (or VMAC ROUTELCL) for best practice. If VMAC is coded on an OSA interface, the default is ROUTEALL because the default IP forwarding option in a TCPIP stack is IPCONFIG DATAGRAMFWD where the TCPIP stack can forward packets with unknown destinations to a neighbor LPAR or network router (for example, default router). If a TCPIP stack does not have IP forwarding enabled, then it will drop packets with unknown destinations sent from the OSA that has IP forwarding enabled. VMAC ROUTEALL is equivalent to PRIROUTER and SECROUTER in that the OSA will forward packets with unknown destinations to the LPAR that owns the VMAC. VMAC ROUTELCL is equivalent to NONROUTER in that the OSA will not forward packets with unknown destinations to a LPAR. For the ping, I assume that it is issued from IBM Z to zLinux guest with Wireshark.
Thanks!
Best regards- Jon Bell (JB)
IBM z/OS Communications Server Support
------------------------------
Jon Bell
------------------------------
Original Message:
Sent: Tue February 27, 2024 01:40 PM
From: Colin Paice
Subject: Using EZBRCIFR for dropped packets
If I define my interface with PRIROUTER, I can see the packets, and I get drop reason code IP_NO_FWD The packet cannot be forwarded as expected.
------------------------------
Colin Paice
Original Message:
Sent: Tue February 27, 2024 07:02 AM
From: Colin Paice
Subject: Using EZBRCIFR for dropped packets
I am using EZBRCIFR to trace TCP/IP traffic, and this works well.
I see there is support to trace dropped packets.
I have set
my.filter.RCFLPkt.RCPKFiltFlags |= RCPKFDISCARD; (it is set to 1200)
my.filter.RCFLPkt. RCPKDiscard = traceDiscard; (it is the value 1)
If I ping a valid address 7.168.1.74 I get out trace data.
If I ping an invalid address 7.168.1.75 ... I do not get any data.
Wireshark on Linux shows the traffic on the interface.
Should I see the packet with the invalid address on the interface? or have I misread the documentation?
I would expect a reason code of IP_OPT_FWD =The packet cannot be forwarded.
Colin
------------------------------
Colin Paice
------------------------------