Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Connecting Cisco switch to pfsense difficulty.

    L2/Switching/VLANs
    2
    18
    927
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      stampeder @johnpoz
      last edited by stampeder

      @johnpoz So the traffic between eth1/1 and eth1/2 has two vlans (100 and 1000). Hence I believe they should be trunk ports which allow both vlans.
      The traffic coming out of port eth1/3 has only the vlan 100 traffic on it (this is my inband management) Vlan 100 uses the network ip of 172.16.95.0/24. This connects to the pfsense box on my ETX lan port. This is where I am a little confused.
      Here is what I have so far:

      3048v2.png
      According to what I am reading the ETX lan port expected native vlan (ie untagged traffic).
      When I first configured my 3048 switch I had port 3 set to switchport access. Should I be reverting eth1/3 on the 3048 to an access port? How will I tell it to pass only vlan 100 traffic?
      Sorry to be so thick on this. But I am getting closer. I appreciate your patience....

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @stampeder
        last edited by

        @stampeder if the only traffic on port 3 is going to be vlan 100, and untagged then yes that would be a access port in vlan 100.

        If you want untagged traffic on trunk port, you will need to set vlan 100 as native.. on your trunk ports

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        S 1 Reply Last reply Reply Quote 0
        • S
          stampeder @johnpoz
          last edited by stampeder

          @johnpoz I set eth1/3 to mode access. I specified vlan 100. So with this connected to pfsense on my ETX port I should be able to go into Diagnostics and ping UUT#1 at 172.16.95.120:

          3048-v3.png

          However, my pings come back as 100% loss. Where am I going wrong in this? I have my firewall rules set to pass any to any.

          BELAY THAT ORDER SAILOR....IT WORKS....
          I had my lan plugged into the wrong port on the 3048. Once I plugged into the correct port the ping works like a charm on both UUT's.
          You are my new hero.
          THANKS SO MUCH FOR ALL YOUR HELP. Colour me one happy camper!!

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @stampeder
            last edited by johnpoz

            @stampeder pinging what from where? Your trunks on 1 and 2 are still not right.. If the device is not sending a tag with its vlan 100 traffic its not going anywhere.. And if you ping from pfsense to one of the device, that traffic to the device would be tagged. And the device wouldn't see it, etc..

            You need to set your ports 1 and 2 to be native vlan 100 so that traffic is not tagged, and any untagged traffic that enters the port from the device will be put on vlan 100.

            edit: its not going to work like that.. unless your default vlan on the switch is 100? The default vlan on a trunk would be untagged.

            Can you do say this command

            sg300-28#sho interfaces switchport gi14 
            Added by: D-Default, S-Static, G-GVRP, R-Radius Assigned VLAN, T-Guest VLAN, V-Voice VLAN
            Port : gi14
            Port Mode: Trunk
            Gvrp Status: disabled
            Ingress Filtering: true
            Acceptable Frame Type: admitAll
            Ingress UnTagged VLAN ( NATIVE ): 2
             
            Port is member in: 
             
            Vlan               Name               Egress rule     Added by     
            ---- -------------------------------- ----------- ---------------- 
             2                 Wlan                Untagged          S         
             4                W_PSK                 Tagged           S         
             6               W_Guest                Tagged           S         
             7                W_Roku                Tagged           S         
             9                  9                   Tagged           D         
            110               W_Cam                 Tagged           S         
            
             
            Forbidden VLANS: 
            Vlan               Name               
            ---- -------------------------------- 
            
             
            

            I not sure if I have access to a NX3048 in work network, and don't for sure have one at home.. We have 7k and 9k etc.., would have to look if any of those old switches are still in use, so not 100% sure that command is valid on them..

            But notice that it lists vlan 9, that is the default vlan on my switch.. But I don't want untagged traffic to be on vlan 9, I want it on vlan 2 which is why I set native to 2.. Your config works if your default vlan is 100 on your switch.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            S 1 Reply Last reply Reply Quote 0
            • S
              stampeder @johnpoz
              last edited by

              @johnpoz Crap. I spoke too soon. When I issued the ping it was from source autoselect which I believe was issued from the gateway of the ETX port.
              Anyway when I used source as LAN it of course did not work as you pointed out.
              I"ll go an add the vlan 100 as native on both eth1/1 and eth1/2. I'm assuming that all I have to add to eth1/1 and eth1/2 is"switchport trunk native vlan 100" I should also remove the vlan 100 from the "trunk allowed vlan" line?

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @stampeder
                last edited by

                @stampeder no you shouldn't have to remove it.. notice my command for allowed is an add, not a direct allowed list.. Your still going to want to allow the vlan..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                S 1 Reply Last reply Reply Quote 0
                • S
                  stampeder @johnpoz
                  last edited by stampeder

                  @johnpoz I tried to change the vlan allowed statement to add in eth1/1 and eth1/2. However, it doesn't appear the NX-OS 9.3 allows it as a config statement. Turns out one has to do the vlan add statement using the port-channel interface.
                  I'm off to do a bunch of reading on how to use the port-channel interface in NX-OS.
                  Isn't this fun.,....

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @stampeder
                    last edited by johnpoz

                    @stampeder huh, those ports are not in a port channel.

                    conf t
                    interface ethernet1/1
                    switchport trunk native vlan 100

                    Keep in mind not sure what differences there might be with NX-OS 9.3

                    edit:

                    here
                    https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus3000/sw/layer2/503_U1_1/b_Cisco_n3k_layer2_config_gd_503_U1_1/b_Cisco_n3k_layer2_config_gd_503_U1_1_chapter_0101.html

                    native.jpg

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      stampeder @johnpoz
                      last edited by

                      @johnpoz Thanks for this and your patience. I have definitely been working on NetGear, TP-Link an Zyxel managed switches for too long and forgot all my Cisco commands stuff. Ignore my comment about port channel as I was reading about how to add a vlan to a trunk port.
                      My switch is doing some weird things. If I add a description of say port eth1/1 the running-config will display what I entered. If however I enter the command:
                      switchport trunk allowed vlan add 1000
                      the command does not show up on the running-config listing. If however I enter the command:
                      switchport trunk allowed vlan 100,1000
                      this command does NOT show up on the running-config listing even though according to the Cisco Nexus 3000 Series NX-OS Layer 2 Switching Configuration Guide, Release 9.2(x) it is an allowed command:
                      Configuring the Allowed VLANs for Trunking Ports
                      You can specify the IDs for the VLANs that are allowed on the specific trunk port.

                      Before you configure the allowed VLANs for the specified trunk ports, ensure that you are configuring the correct interfaces and that the interfaces are trunks.

                      SUMMARY STEPS
                      switch# configure terminal
                      switch(config)# interface {type slot/port | port-channel number}
                      switch(config-if)# switchport trunk allowed vlan {vlan-list all | none [add |except | none | remove {vlan-list}]}
                      DETAILED STEPS
                      Command or Action Purpose
                      Step 1
                      switch# configure terminal

                      Enters global configuration mode.

                      Step 2
                      switch(config)# interface {type slot/port | port-channel number}

                      Specifies an interface to configure, and enters interface configuration mode.

                      Step 3
                      switch(config-if)# switchport trunk allowed vlan {vlan-list all | none [add |except | none | remove {vlan-list}]}

                      Sets allowed VLANs for the trunk interface. The default is to allow all VLANs on the trunk interface: 1 to 3967 and 4048 to 4094. VLANs 3968 to 4047 are the default VLANs reserved for internal use by default; this group of VLANs is configurable. By default, all VLANs are allowed on all trunk interfaces.

                      Note
                      You cannot add internally allocated VLANs as allowed VLANs on trunk ports. The system returns a message if you attempt to list an internally allocated VLAN as an allowed VLAN.

                      Example
                      This example shows how to add VLANs to the list of allowed VLANs on an Ethernet trunk port:

                      switch# configure terminal
                      switch(config)# interface ethernet 1/3
                      switch(config-if)# switchport trunk allow vlan 15-20

                      Do you think that as it says "The default is to add all VLANS" that it doesn't store it because it is already allowed?

                      I'm going to go back to the start of our conversation and reread it all. I think I am missing something.
                      By the way my name is Glenn....

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @stampeder
                        last edited by johnpoz

                        @stampeder Not sure what your going on to be honest.. You have gone down some rabbit hole of your own making... I have told you multiple times now how to configure your ports.. you need to set 100 as native vlans on those ports.

                        I even linked to the cisco docs that show you how to set it as native.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.