Issue accessing certain websites
-
@johnpoz I did.. and edited my post. :)
-
@russm yeah I saw - I tagged Steve, he would be the guy I would ask about how that could or would happen, etc.
-
@russm I found this
https://forums.freebsd.org/threads/vlan-lagg-mtu-1496-expected.55313/
This is in Steve's wheelhouse for sure I would think... Lets give him a bit to see if he is online, if not next time I chat with him will for sure bring this thread to his attention. If I was having such an issue, he is the guy I would ask for sure ;)
I have not seen such an issue before. But that could explain the icmp message.
edit: what specific are you running pfsense on, what version? You running this on Xen hypervisor? I think xn0 is from that is it not?
-
@johnpoz Thanks. I am running PFsense on XCP-NG. I just checked the MTU in there, and they're all set to 1500.
-
@russm I found this really OLD redmine that seems related, and shows the 1496
https://redmine.pfsense.org/issues/4103
Wish I could provide more help - but I have like zero experience with Zen.. Personally have never seen such an issue in like 30 years that I can recall.. But yeah that mtu is most likely related to your problem, I can say that for sure ;)
-
@johnpoz Thanks for the help so far. Hopefully Steve can provide some insight.
-
is it relevant to your situation? ->
In a XEN Virtual machine configuration the XEN VM network interface is mapped to a bridge device on the XEN Host. The Bridge on the XEN host is mapped to a physical Ethernet interface. If the user configures a VLAN interface on a bridge device it does not handle the four byte tag and the maximum frame size with the four byte VLAN tag data is still 1514 bytes. This will force the maximum MTU to be 1496 bytes, not 1500, on the VLAN interface. If the user is using TCP or some other network protocol that negotiates a segment size then the 1496 versus 1500 MTU difference is not an issue. The side with the 1496 MTU will simply negotiate a smaller segment size. But if the network application is perhaps a multicast or some other protocol that does not negotiate an end to end segment size then the transmit from a MTU 1500 host to a host with an interface set to a MTU of 1496 will most likely result in the packet from the MTU 1500 host being dropped at the destination interface with the MTU 1496. Details So with the bridge being in between the XEN VM and the XEN Host how does one configure a VLAN for a XEN VM? Create the VLAN interface on the XEN host and map a bridge to this interface. Then a XEN VM interface mapped to that bridge would automatically use the VLAN, one do not need to configure the VLAN 802.1q driver in the XEN VM. The XEN host VLAN interface takes care of adding and removing the VLAN tag as needed. The VLAN on the XEN host interface takes care of the four byte tag automatically so the user does not need to adjust the MTU size. Keep the XEN host bridge device at a MTU of 1500 so it is compatible with the MTU of other systems in its subnet. Then create the VLAN under the XEN VM, with the 802.1q driver, and set its MTU to 1496. This will work OK for any network protocol that negotiates an end to end segment size. For network protocols that do not negotiate a segment size then any packet sent from a MTU 1500 host will get dropped at the XEN host bridge and never arrive at the XEN VM VLAN interface. Set the XEN Host interface and matching bridge to a MTU of 1504. Then when the user creates the XEN VM VLAN it can use a MTU of 1500 and the additional 4 bytes added to the XEN HOST bridge and interface will allow the 1518 frame size. But this will place a MTU mismatch on the XEN HOST. Since a MTU of 1504 is an odd size not all network drivers will accept this MTU size. Option 1 is the easiest to use and the MTU mismatches do not exist. But if there is a network design reason to only use the 802.1q driver under the XEN VM, then choice 2 or 3 can be used as long as the MTU mismatch drawbacks are considered.
-
@kiokoman Yeah I would think this is exactly what he is running into.
My take on that would be to do the tags on the actual host, and the pfsense should just have standard vm interfaces and not know about the tags..
-
-
Initial tests are good. I'll reconfigure the VLANs this way tonight.
-
-
-
-
@russm Great - and I for sure learned something about issues that can come about with zen, there is actually another active thread which I think is the same problem