Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Traffic Graph and trunk links

    Scheduled Pinned Locked Moved General pfSense Questions
    15 Posts 2 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Is it graphing the parent interface or a VLAN on it?

      If it's the parent you might expect to see traffic on VLANs on it.

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @stephenw10
        last edited by

        @stephenw10 Just a VLAN
        So if you see the below screen shot, the interface which is a vlan on a trunk has over 10Mb of traffic but there is no talker that comes up that shows that.
        But if i go on my Wireless IoT vlan, those spikes makse more sense and i see the top talker pulling down 10Mbp of traffic.

        19e0104a-3957-4143-be3a-fee8ec7d326a-image.png

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          That's on the 6100? 7100? What is the parent interface for it? I assume in 23.05.1?

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @stephenw10
            last edited by

            @stephenw10 This is on a 6100 on 23.05.1 Release. igc2 interface

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              This test box is running 23.09, so this might have been fixed already, but do you see that on the dash graphs too?

              Screenshot from 2023-09-29 00-40-51.png

              Those 3 VLANs are on LAN2 which I is what I expect.

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @stephenw10
                last edited by michmoor

                @stephenw10 The dash graphs is how I originally spotted the issue.
                I then went into Traffic Graph to identify in the UNIFI VLAN what is talking so much and either no IPs show up or if one does it’s below a meg of traffic as I would expect as it’s only APs and switches in that vlan

                I just took this off my dashboard now. How is the UNIFI vlan pulling down the same traffic level of Kidszone? Same trunk link but different vlan/subnets? Different firewall rulesets. So in theory its not possible to have the same flows.

                e59c95ce-9c94-4bd3-b6f5-566318f61204-image.png

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Hmm, can you test 23.09? I can't see a bug specifically for this....

                  If not I'll try to replicate in 23.05.1

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @stephenw10
                    last edited by michmoor

                    @stephenw10 Can i use boot environments for this? I got a system that i can throw 23.09 on it but i want to know if its possible to switch back to 23.05.1 if need be and have everything be the way it was once i tested out this issue.

                    edit: unless there is a soon-to-be release in the next few days i can wait. 😊

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yes you can create a 23.05.1 boot environment and then roll back to it from 23.09.

                      M 1 Reply Last reply Reply Quote 1
                      • M
                        michmoor LAYER 8 Rebel Alliance @stephenw10
                        last edited by michmoor

                        @stephenw10

                        1. During the update i get the error that it failed..

                        811ec8a9-b54e-4a79-812b-bcc1e7f96ebe-image.png

                        After a few minutes i get the email that the Boot UP is complete but the graphing is still broken.

                        0de9b5ac-fd92-4f9e-8441-fae7e161e0db-image.png

                        There is absolutely no way there is 200M of traffic on the Unifi VLAN. Impossible but it matches the spikes of a different VLAN (IoT). Somehow the graphing of the trunk is wrong.

                        I will be switching back to 23.05 now.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 1
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Hmm. Do you have the parent igc NIC assigned? Does that also show the same traffic?

                          M 1 Reply Last reply Reply Quote 0
                          • M
                            michmoor LAYER 8 Rebel Alliance @stephenw10
                            last edited by michmoor

                            @stephenw10
                            hmmm....
                            igc2 is assigned to the trunk - UNIFI vlan
                            Because Unifi needs to operate on the native vlan i assigned igc2 but it has no vlan assignments.
                            igc2.14 is the IoT vlan

                            Maybe we're on to something here.......

                            21b0aa95-28d9-48be-a90c-074b6586e44c-image.png

                            0ec64cb1-992f-4f80-a431-c692c943d58f-image.png

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by stephenw10

                              Ah, yes, then that's expected. The parent NIC sees the traffic from all VLANs on it. That's exactly what I see above on the graphs here. And why that's the first thing I asked. 😉

                              You should still be able to put client traffic on a VLAN in Unifi and just have the management traffic untagged. Or potentially untag it at a switch in between pfSense and the AP.

                              Steve

                              M 1 Reply Last reply Reply Quote 0
                              • M
                                michmoor LAYER 8 Rebel Alliance @stephenw10
                                last edited by

                                @stephenw10 You did ask i must have misunderstood, my bad on that. But good to know its expected behavior.
                                Thank you so much for the assist here. Appreciate it!!

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                1 Reply Last reply Reply Quote 1
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.