Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense on Sophos XG125w - "no carrier" on all eth interfaces

    Scheduled Pinned Locked Moved Hardware
    28 Posts 7 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Hard to imagine it would make any difference given that the ports show link LEDs but worth trying.

      D 1 Reply Last reply Reply Quote 0
      • S
        S762
        last edited by

        FWIW I have the XG115 Rev 3 and by default the Wan interface was igb0, I had to change the Wan interface to ibg2 to get it to work..

        D 1 Reply Last reply Reply Quote 0
        • D
          dkzsys @stephenw10
          last edited by

          @stephenw10 said in pfSense on Sophos XG125w - "no carrier" on all eth interfaces:

          Hard to imagine it would make any difference given that the ports show link LEDs but worth trying.

          Got my old Airport Extreme out and set it up as a bridge/switch. Still no luck.

          1 Reply Last reply Reply Quote 0
          • D
            dkzsys @S762
            last edited by

            @s762 said in pfSense on Sophos XG125w - "no carrier" on all eth interfaces:

            FWIW I have the XG115 Rev 3 and by default the Wan interface was igb0, I had to change the Wan interface to ibg2 to get it to work..

            Yep - tried played around with different ports (including LAN and WAN), unfortunately not much luck here.

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Mmm, that seems like it must be some custom PHY if the LEDs show link but the driver is not passed that info. Or at least something not supported in the FreeBSD driver.
              Very odd that it would apply to both igb and ix though... 🤔

              1 Reply Last reply Reply Quote 0
              • jimpJ jimp moved this topic from Problems Installing or Upgrading pfSense Software on
              • D
                dkzsys
                last edited by

                An update
                I have tried a couple of ways to install drivers, but didn't have much luck. So I installed pfSense CE v2.7, hoping that the FreeBSD 14 may have newer drivers and might fix the issue. Unfortunately no luck there either.

                I can see drivers are missing for these hardware (excluding the wireless adaptor)...

                • Atom Processor C3000 Series SMBus controller
                • Atom Processor C3000 Series SMBus controller - Host
                • Atom Processor C3000 Series SPI Controller
                • Atom Processor C3000 Series QuickAssist Technology
                • Atom Processor C3000 Series Root Complex Event Controller
                • Aton Processor C3000 Series ME HECI 1
                • Atom Processor C3000 Series Power Management Controller

                Screenshots (pciconf) for reference:
                missing drivers 01.jpg
                missing drivers 02.jpg
                missing drivers 03.jpg

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  The only time I've seen behaviour like that is when the NICs are arranged in bypass pairs. I don't see the ports labeled like that but you should check if there are bypass relays on the board.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S stephenw10 referenced this topic on
                  • stephenw10S stephenw10 referenced this topic on
                  • D
                    distengr
                    last edited by

                    I have the same problem and wondering if you managed to find a fix for this. It's so disappointing to see when you have a hardware where you shouldn't have problem with the drivers since the NICs have been around for ages and work great on regular headless PCs, but has problem with Sophos boxes.

                    D 2 Replies Last reply Reply Quote 0
                    • D
                      dkzsys @distengr
                      last edited by dkzsys

                      @distengr Yes - I figured out what happened... and it was another silly human error... (Nevertheless, learnt a few things along the way, so consider it a relatively low return for the few nights play-around)

                      TL;DR:

                      • The issue was a false assumption on eth port allocation, and the failing auto-detection "Assign Interfaces".
                      • The resolution is to a) set static IP address on client/PC interface and b) connect to the correct eth interface.

                      The long version of the story
                      5. Final.jpg

                      As per picture above, since 1) the auto-detection in "Assign Interfaces" didn't work, 2) the auto assigned WAN and LAN in pfSense are on igb0 and igb1, and 3) on the Sophos appliance, the WAN and LAN are labelled are the top NIC card, so I made a killer assumption that igb0 and igb1 are port 1 and port 2 of the top NIC card respectively.

                      It turns out that igb0 and igb1 actually correspond to port 1 and port 2 of the lower NIC card.

                      There is one more prerequisite to bring up the interface (to Active) - that is to set a static IP on the client side interface (i.e. your PC/Mac, etc).

                      Now I have a fully functional pfSense on the Sophos appliance (installed CE 2.6 and upgraded to pfSense Plus 23.01); and I am continuing my nights of effort playing around with pfSense features:)

                      I'd like to thank @stephenw10 for chipping in on the ideas! Very much appreciated!


                      BTW, @stephenw10, I've been messing around with squid transparent proxy and SSL bump (SSL/TLS filtering); as well as pfBlocker-NG DNSBL. Spent a few nights on them but couldn't find an elegant solution for implementation. Any pointers of reference or guide please?

                      Specific challenges below:

                      Squid Transparent Proxy and SSL Bump (SSL/TLS filtering)
                      With the default squid v3.5 branch from the pfSense package manager, I have challenges to

                      1. ACL destination domain (ssl_bump none), in order to workaround websites/apps that have implemented server cert pinning (I understand that if the DNS resolution for the domain resolves to multiple IPs, ACL dstdomain doesn't work/support it. Is this true?)
                      2. wss WebSocket doesn't work. (I'll need http_upgrade_request_protocols from Squid v5??)

                      As a workaround for the 2 challenges above, I had to use ACL dst IP address... Is this really my only option?

                      pfBlocker-NG DNSBL
                      I am trying use DNSBL to block/not-resolve subdomains using regex (in DNSBL list), and it doesn't seem to work. Am I over-complicating it?
                      Is my other option to use "Wildcard Blocking (TLD)"? Any other options?
                      4fc635fb-ca2f-4872-b278-f8a0fe7451df-image.png

                      I found that information are pretty scattered; and most posts on these topic seem to be outdated. Would be great to have some advise from you, @stephenw10. Thanks in advance!

                      E 1 Reply Last reply Reply Quote 1
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Personally I use DNS-BL with TLD widlcards enabled and it works well.

                        I would advise you don't use Squid at all unless you are forced to. And generally that means in a deployment where you must log all sites visited for example.

                        D 1 Reply Last reply Reply Quote 0
                        • D
                          dkzsys @stephenw10
                          last edited by

                          @stephenw10 said in pfSense on Sophos XG125w - "no carrier" on all eth interfaces:

                          Personally I use DNS-BL with TLD widlcards enabled and it works well.

                          An implementation question, let's say if you want to block all the subdomains for roblox.com, in your list do you define it as ".roblox.com" as a line entry?

                          I would advise you don't use Squid at all unless you are forced to. And generally that means in a deployment where you must log all sites visited for example.

                          I'm using it mainly to track my children's internet usage (till they figure out ways to workaround it..), so yes, I need all visited sites logged. I have a solution to segregate other devices, based on DHCP subnet, so other devices in the network are exempted from ssl bumping. Any thoughts/ideas on overcoming the 2 challenges?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            I have a custom list with TLDs in I want to block that gets parsed with the fetched adblock lists. It just contains the TLDs.

                            DNSBL custom.png

                            How are you using the ACLs in Squid?

                            I've never tried to use anything special for websockets. Not a problem I've seen or tried to work past before.

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • D
                              dkzsys
                              last edited by

                              @stephenw10 Thanks for sharing your implementation of custom list under DNSBL Groups. Nice and easy way to turn them on and off.

                              I am using pfSsense DNS Resolver (via DHCP), and DoT to external/public DNS service providers (Cloudflare and Google). Clients (browsers, and MacOS) seem to go directly to the public DNS service providers, via port 443 (DoH) or port 853 (DoT). I am testing with some firewall rules to block/reject them, to ensure all DNS traffic goes through pfSense DNS Resolver. Still not 100% clear how effective this implementation is.

                              WRT ACL, my implementation is relatively straightforward.

                              • acl bypass_ssl src IP address (DHCP subnet and specific hosts)
                              • acl bypass_ssl_dst dst IP address (to domains that use WebSockets or enforce server cert pinning)
                              • I've read through the squid config reference; and am about to try "acl broken_sites ssl::server_name .example.com" when I get home tonight.
                              1 Reply Last reply Reply Quote 0
                              • D
                                dkzsys @distengr
                                last edited by

                                @distengr Hope you managed to fix your issue with your sophos appliance.

                                D 1 Reply Last reply Reply Quote 0
                                • D
                                  distengr @dkzsys
                                  last edited by

                                  @dkzsys - Mate, you got a fantastic write-up on how you fixed the issue. I tried your approach of going through the different ports, but the problem is, it never showed WHICH port. It just kept showing "link up". That is way too vague for me to decide, what exactly was happeninging. Eventually, I ran out of steam and got frustrated when Netgate support simply told me that they plan to release drivers for these NICs only in 2.7.0 and "had no idea when that release will be out".

                                  I searched around the Internet and found that Opnsense already has drivers for these and seeing Linux Tech Tips(LTT) make a switch to Opnsense since Pfsense have drivers for their NIC simply pushed the nail in the coffin for me.

                                  I'll be holding on to this install for a while and see how it goes and will probably tinker around in pfsense by using your guide few months down the line. Thank you again for posting the detailed response!

                                  1 Reply Last reply Reply Quote 1
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Um, for igb? The only driver that's currently in 2.7 and not 2.6 is the igc version that supports i226.

                                    The doesn't apply to either of those Sophos devices.

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      dabbler455
                                      last edited by

                                      Has anyone tried to use the sfp port with a GPON optic as a WAN port for incoming ISP fiber?

                                      D 1 Reply Last reply Reply Quote 0
                                      • D
                                        dkzsys @dabbler455
                                        last edited by

                                        @dabbler455 not from here. Unfortunately, my provider doesn't offer that option.

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          ErniePantuso @dkzsys
                                          last edited by ErniePantuso

                                          @dkzsys I'm having the same exact problem but I don't understand how you resolved it. I've set a static IP on my PC but that hasn't helped. I've tried assigning the WAN interface to igb1 and LAN to igb0 but it still doesn't work.

                                          I guess I'm not getting the whole "upper NIC card/lower NIC card thing". Are you saying that I should use igb0 as WAN and igb1 as LAN - but connect to the ports labeled 5 and 6 on the back of the unit?

                                          D 1 Reply Last reply Reply Quote 0
                                          • D
                                            dkzsys @ErniePantuso
                                            last edited by

                                            @ErniePantuso see diagram below for illustration, for Sophos XG125W. Similar concept applies to other appliances with multiple NIC cards. See if this makes sense, otherwise, feel free to ask more questions.
                                            2934e6ac-cc43-4b4f-afcf-745f1c74b728-image.png

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.