Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    LAG or use two physical switch ports?

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    22 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • CreationGuyC
      CreationGuy @CreationGuy
      last edited by CreationGuy

      @johnpoz I'm a little lost now. I enabled VLAN 90 (CAMLAN) on IGC1. DHCP and firewall rules were copied over from the old CAMLAN configs. I deleted the old CAMLAN config from IGC0. It seems that all of that is correct.

      On the switch, I configured Port 23 which is connected to IGC1 to:
      VLAN member: 1,90, VLAN Tag: 90

      Port 24 which is connected to IGC0 to:
      VLAN Member: 1,10,20,200. VLAN Tag: 10,20,200

      I took 90 from 24 and placed it on 23. Devices can no longer communicate with devices on 90 VLAN.

      CreationGuyC 1 Reply Last reply Reply Quote 0
      • CreationGuyC
        CreationGuy @CreationGuy
        last edited by

        Hmmm, I think what the problem was that under interfaces, I disabled IGC1 so it wouldn't show in the Firewall as a configurable option. I had VLAN 90 attached to IGC1 and that is enabled and configured for DHCP.

        IGC0, by itself, needs to be on? Can I just leave it with no IPv4 config and no DHCP? Do I need FW rules on it since it's not being used?

        I do have FW rules on VLAN 90 connected to IGC1. I don't think that I'm doing a good job explaining. Here's some screen shots:

        Screenshot 2022-09-28 at 23-12-17 TheWall.jrfam.lan - Interfaces IGC1 (igc1).png

        Screenshot 2022-09-28 at 23-12-43 TheWall.jrfam.lan - Interfaces CAMLAN (igc1.90).png

        Screenshot 2022-09-28 at 23-13-04 TheWall.jrfam.lan - Firewall Rules CAMLAN.png

        Screenshot 2022-09-28 at 23-15-31 NETGEAR GS324TP.png

        johnpozJ 1 Reply Last reply Reply Quote 0
        • CreationGuyC
          CreationGuy
          last edited by

          Just wanted to bump this

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @CreationGuy
            last edited by

            @creationguy this makes no sense

            makesnosense.jpg

            How would all of these rules show exactly the same amount of traffic? And how would block rules have active states?

            Did you copy these rules.. I am thinking they all have the same RID?

            Nor do I understand why you have g23 and g24 both in vlan 1? Makes no sense to do that.. You didn't bridge igc0 and igc1 did you? How would they have vlan 1 traffic on them? That would be native untagged traffic..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            bingo600B 1 Reply Last reply Reply Quote 0
            • bingo600B
              bingo600 @johnpoz
              last edited by bingo600

              @johnpoz said in LAG or use two physical switch ports?:

              Did you copy these rules.. I am thinking they all have the same RID?

              Smells a bit of
              https://forum.netgate.com/post/1063789

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @bingo600
                last edited by johnpoz

                @bingo600 said in LAG or use two physical switch ports?:

                https://forum.netgate.com/post/1063789

                sure does - what version of pfsense are you running, are you on a 2.7 snapshot? There was another thread around here where that happened as well. Took a bit to find that one, have to see if I can find it.

                But just don't see how all 4 of those rules could have the exact same amount of traffic, and the same amount of active states. How does a block rule ever have a active state? I have never seen that, shouldn't be able to happen because the firewall rule blocks traffic before a state is ever created.

                Or wait - maybe the thread I am thinking of is when he had changed the interface names in the xml, and his aliases were not working.. So many threads - heheheh.. But yeah what your seeing there with the states and traffic - something is not right that is for sure.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                CreationGuyC 1 Reply Last reply Reply Quote 0
                • CreationGuyC
                  CreationGuy @johnpoz
                  last edited by CreationGuy

                  @johnpoz I'm on 22.05-RELEASE (amd64).

                  I did use the Copy button, should I not have done that? I used it to copy from the old camlan vlan, thought it would be easier.

                  With this switch, I need to have vlan 1 on there or I can manage the switch. No bridging.

                  edit: Rebuilding the rules now.Screenshot 2022-09-29 at 14-46-13 TheWall.jrfam.lan - Firewall Rules CAMLAN.png

                  I think I know the answer, but do I need to have IGC0 enabled in order for IGC0.90 to work? It appears that way. If so, I guess I'm all set?

                  Is there really that big of an issue with the vlan 1 on 23 and 24? I could remove it from 23 and see what it does but in the past its caused problems.

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @CreationGuy
                    last edited by

                    @creationguy you should not have vlans enabled on ports that they are not viable on. putting those ports in vlan 1 means any untagged traffic seen will be in vlan 1 per your pvid, and any broadcast traffic that is in vlan 1 will go out those ports, etc.

                    There is zero reason for those to have vlan 1 on them, unless you want untagged traffic in and out and in your default vlan. And how would that be on both of them.. It makes no sense..

                    And your bottom 2 rules still seems like same RID..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    CreationGuyC 1 Reply Last reply Reply Quote 0
                    • CreationGuyC
                      CreationGuy @johnpoz
                      last edited by CreationGuy

                      @johnpoz I'll rebuild those, did not notice that. Thank you.

                      I am learning this VLAN stuff trial by error... mostly by error. I'm trying to scratch together how to do this with this particular switch so I do thank you for the help.

                      I changed port 23 as show and I can still reach the cameras and nvr.

                      Port 24 is connected to IGC0 on the 4100, I have VLANs set up on that interface, the ones you see in the screen shot. How should I have the PVID set on that?

                      Port 13 is my Access point that, 10 and 200 are the VLANs for LAN and Guest.

                      Screenshot 2022-09-29 at 21-40-19 NETGEAR GS324TP.png

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @CreationGuy
                        last edited by

                        @creationguy pvid should be what vlan you want the traffic in if for whatever reason there is untagged traffic seen into that interface.

                        Do you have a IP set directly on the interface? That would be untagged, and the pvid should be set to what vlan you want that on your switch.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        CreationGuyC 1 Reply Last reply Reply Quote 0
                        • CreationGuyC
                          CreationGuy @johnpoz
                          last edited by

                          @johnpoz said in LAG or use two physical switch ports?:

                          @creationguy pvid should be what vlan you want the traffic in if for whatever reason there is untagged traffic seen into that interface.

                          Do you have a IP set directly on the interface? That would be untagged, and the pvid should be set to what vlan you want that on your switch.

                          I'm not sure if you're referring to port 24 and PVID or the WAP. I need to have port 24 have those VLANs list, I can only enter 1 PVID for that port so I don't know what what it should be without breaking anything.

                          If you're asking about IP on the interface, for IGC1, no, no IP is configured.

                          Screenshot 2022-09-29 at 22-10-01 TheWall.jrfam.lan - Interfaces IGC1 (igc1).png

                          Screenshot 2022-09-29 at 22-10-19 TheWall.jrfam.lan - Interfaces CAMLAN (igc1.90).png

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @CreationGuy
                            last edited by

                            @creationguy if there is no IP on the interface - how could you have traffic untagged and if you did why would you want it on vlan 1?

                            What interface on pfsense is in vlan 1? Any of them?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            CreationGuyC 1 Reply Last reply Reply Quote 0
                            • CreationGuyC
                              CreationGuy @johnpoz
                              last edited by

                              @johnpoz I may have configured the interfaces incorrectly. IGC0 is named "core", I have LAN, on IGC0.10. Core does have an IP of 10.0.0.1, that interface is untagged. When I first set this up about a month ago, I thought that I had to use the untagged interface.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @CreationGuy
                                last edited by

                                @creationguy said in LAG or use two physical switch ports?:

                                I thought that I had to use the untagged interface.

                                You don't have too.. If your not going to run multiple vlans on the interface there is little reason not too. I run a untagged vlan even on the interface I run other vlans on. Its just not 1 in my case on the switch.

                                But vlan 1 which is the default vlan of the switch, doesn't have to be used, and for sure should be removed from any ports where your not using it.. This could be the switch vlan for your untagged interface in pfsense network, but it should be removed from all other ports on the switch that you do not want in that network, etc.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                CreationGuyC 1 Reply Last reply Reply Quote 0
                                • CreationGuyC
                                  CreationGuy @johnpoz
                                  last edited by

                                  @johnpoz On IGC0, I have the 4100, WAP and the Switch "utagged", would I just change the PVID on those ports, 24, 13 to say VLAN 2 or whatever I am not using?

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @CreationGuy
                                    last edited by

                                    @creationguy If your running tagged only on the port.. Then yeah it would be best to set the pvid to the vlan you want any for whatever reason untagged traffic that might hit that interface to be in.

                                    Might be best to use some black hole vlan ID there, other than the default vlan 1. For example you create a vlan 666 for example. Add ports that are disabled, or ports that should never see untagged traffic set the pvid to that.. This goes nowhere only to other disabled ports, etc.

                                    if your not using vlan 1 actually for anything, that could be your "blackhole" or disabled vlan ID sure..

                                    If you are actually using vlan 1 for other untagged traffic, ie an interface on pfsense has an IP directly on its interface, then your other interfaces that only have tagged traffic should not be in that same vlan for any untagged traffic, whatever the ID is your using on the switch.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    CreationGuyC 1 Reply Last reply Reply Quote 0
                                    • CreationGuyC
                                      CreationGuy @johnpoz
                                      last edited by

                                      This post is deleted!
                                      CreationGuyC 1 Reply Last reply Reply Quote 0
                                      • CreationGuyC
                                        CreationGuy @CreationGuy
                                        last edited by

                                        This post is deleted!
                                        1 Reply Last reply Reply Quote 0
                                        • CreationGuyC
                                          CreationGuy
                                          last edited by

                                          This post is deleted!
                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.