Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    XG-7100 & Unify console troubles: ix0, ix1, dhcp-kea & now sore head

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    18 Posts 3 Posters 273 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pfS_noob_cust @stephenw10
      last edited by

      @stephenw10 Thanks for replying.
      My short answer is yes, I did.

      What's more scary is my actual implementation.

      Here's what console shows:
      LAN (lan) -> lagg0.4091 -> v4: 10.33.33.1/24
      OPT1_IX0 (opt1) -> ix0 ->
      OPT2_IX1 (opt2) -> ix1 ->
      OPT3_NGP3_BLDG (opt3) -> lagg0.612 -> v4: 172.16.12.1/24
      OPT4_NGP4_STORAGE (opt4) -> lagg0.622 -> v4: 172.16.22.1/24
      OPT5_NGP5_DOMAINS (opt5) -> lagg0.632 -> v4: 172.16.32.1/24
      OPT6_NGP6_VPNS (opt6) -> lagg0.662 -> v4: 172.16.62.1/24
      OPT7_NGP8_SEC (opt7) -> lagg0.682 -> v4: 172.16.82.1/24
      OPT8_PFS_UDM_TRUNK (opt8) -> lagg0.1221 -> v4: 10.12.21.1/29
      OPT9_UDMWAN_IX0_PFS (opt9) -> ix0.2222 -> v4: 10.22.22.1/29
      OPT10_UDMT_MOBILES (opt10) -> lagg0.111 -> v4: 192.168.111.1/24
      OPT11_UDMT_VUZ (opt11) -> lagg0.121 -> v4: 192.168.121.1/24
      OPT12_UDMT_SERVICES (opt12) -> lagg0.131 -> v4: 192.168.131.1/24
      OPT13_UDMT_THINGS (opt13) -> lagg0.181 -> v4: 192.168.181.1/24
      OPT14_UDMT_GUESTS (opt14) -> lagg0.191 -> v4: 192.168.191.1/24
      OPT15 (opt15) -> lagg0 ->

      and that reflects my intention.

      And that is reflected in /var/db:
      ---------- 1 root wheel 0 Jun 12 00:38 dhclient.leases.ix1.2222
      ---------- 1 root wheel 0 Dec 27 2022 dhclient.leases.lagg0.1685
      ---------- 1 root wheel 2380 Jun 14 20:27 dhclient.leases.lagg0.4090
      ---------- 1 root wheel 1204 Jun 11 19:21 dhclient.leases.lagg0.4091
      ---------- 1 root wheel 0 Jun 11 22:52 dhclient.leases.lagg0.612
      ---------- 1 root wheel 0 Jun 11 22:54 dhclient.leases.lagg0.622
      ---------- 1 root wheel 0 Jun 12 01:00 dhclient.leases.lagg0.632
      ---------- 1 root wheel 0 Jun 11 22:57 dhclient.leases.lagg0.662
      -rw-r--r-- 1 root wheel 16 Jun 22 2022 dhcp6c_duid
      drwxr-x--- 2 _dhcp _dhcp 2 Dec 8 2023 dhcpcd
      -rw-r--r-- 1 root wheel 13 Jun 13 09:50 ix0.111_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:49 ix0.111_ip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:50 ix0.121_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:49 ix0.121_ip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:49 ix0.131_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:49 ix0.131_ip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:49 ix0.181_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:49 ix0.181_ip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:50 ix0.191_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 13 09:49 ix0.191_ip
      -rw-r--r-- 1 root wheel 10 Jun 12 22:02 ix0.2222_cacheip
      -rw-r--r-- 1 root wheel 10 Jun 12 22:01 ix0.2222_ip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.111_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:13 ix1.111_ip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.121_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.121_ip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.131_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:13 ix1.131_ip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.181_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.181_ip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.191_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 12 09:14 ix1.191_ip
      -rw-r--r-- 1 root wheel 10 Jun 12 09:14 ix1.2222_cacheip
      -rw-r--r-- 1 root wheel 10 Jun 12 09:14 ix1.2222_ip
      drwxr-xr-x 2 root wheel 3 May 27 04:18 kea
      -rw-r--r-- 1 root wheel 13 Jun 8 17:35 lagg0.111_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 8 17:35 lagg0.111_ip
      -rw-r--r-- 1 root wheel 13 Jun 11 06:44 lagg0.131_cacheip
      -rw-r--r-- 1 root wheel 13 Jun 11 06:44 lagg0.131_ip
      -rw-r--r-- 1 root wheel 11 Jun 11 15:40 lagg0.212_cacheip
      -rw-r--r-- 1 root wheel 11 Jun 11 15:40 lagg0.212_ip
      -rw-r--r-- 1 root wheel 11 Jun 11 12:21 lagg0.282_cacheip
      -rw-r--r-- 1 root wheel 11 Jun 11 12:21 lagg0.282_ip
      -rw-r--r-- 1 root wheel 10 May 30 05:47 lagg0.3222_cacheip
      -rw-r--r-- 1 root wheel 10 May 30 05:47 lagg0.3222_ip
      -rw-r--r-- 1 root wheel 13 Jun 14 08:27 lagg0.4090_ip
      -rw-r--r-- 1 root wheel 10 Jun 13 09:49 lagg0.4091_cacheip
      -rw-r--r-- 1 root wheel 10 Jun 13 09:49 lagg0.4091_ip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.612_cacheip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.612_ip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.622_cacheip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.622_ip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.632_ip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.662_cacheip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.662_ip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.682_cacheip
      -rw-r--r-- 1 root wheel 11 Jun 13 09:49 lagg0.682_ip

      I checked, and each and every one of those interfaces have DHCPd enabled.

      At present each of these interfaces, all enabled; are DHCPd configured with "Allow all Clients". No matter which switch port I plug Annabelle into, she reports the LAN address - without fail.

      Per the description, "When set to Allow all clients, any DHCP client will get an IP address within this scope/range on this interface. "

      I could try other clients, OSes, etc, but the description is clear.

      This behavior is consistent with my smaller test, which explored the various "Deny Unknown Clients" options. I did not do that here, but it is my intention to utilize that functionality.

      My findings indicate that it doesn't work as intended.
      And, THAT, is disconcerting, in that the entire intention of having a discriminating switch, is to ensure, that a device on its port, will have the offered address and VLAN id. That is NOT presently apparent.

      I would like to explore how and why this is not working.
      Your insights and experience are very welcomee.
      Thanks.

      patient0P 1 Reply Last reply Reply Quote 0
      • patient0P
        patient0 @pfS_noob_cust
        last edited by

        @pfS_noob_cust what did you change from the working to the non working state: did you change the DHCP server from ISC to KEA? Did you change firewall rules?

        In your last post "What's more scary is my actual implementation" you don't show the VLANs configuration so I have only the frist picture to go.

        Let's narrow it down a bit (I'm a simple creature) and have a look at only one interface:

        • OPT4_NGP4_STORAGE (opt4) -> lagg0.622 -> v4: 172.16.22.1/24

        How are the clients connected to that port, using a switch? On pfSense VLAN 622 is configured only on port 4, in access port mode (called "native VLAN" on Unifi). The traffic will leave port 4 untagged and the switch would have to be configured accordingly.

        The firewall rule for OPT4_NGP4_STORAGE allows everything, that can't be the show stopper.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator @stephenw10
          last edited by

          @stephenw10 said in XG-7100 & Unify console troubles: ix0, ix1, dhcp-kea & now sore head:

          Have you set the PVID in the switch ports tab to match the VLANs?

          Let's see that tab then.

          Or the output of etherswitchcfg.

          P 1 Reply Last reply Reply Quote 0
          • P
            pfS_noob_cust @stephenw10
            last edited by stephenw10

            @stephenw10 said in XG-7100 & Unify console troubles: ix0, ix1, dhcp-kea & now sore head:

            etherswitchcfg

            Here's the latter...
            etherswitchcfg

            etherswitch0: VLAN mode: DOT1Q
            port1:
                    pvid: 4090
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (1000baseT <full-duplex>)
                    status: active
            port2:
                    pvid: 4091
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (1000baseT <full-duplex>)
                    status: active
            port3:
                    pvid: 4091
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (none)
                    status: no carrier
            port4:
                    pvid: 4091
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (1000baseT <full-duplex,master>)
                    status: active
            port5:
                    pvid: 4091
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (none)
                    status: no carrier
            port6:
                    pvid: 4091
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (none)
                    status: no carrier
            port7:
                    pvid: 4091
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (1000baseT <full-duplex>)
                    status: active
            port8:
                    pvid: 4091
                    state=8<FORWARDING>
                    flags=0<>
                    media: Ethernet autoselect (none)
                    status: no carrier
            port9:
                    pvid: 1
                    state=8<FORWARDING>
                    flags=1<CPUPORT>
                    media: Ethernet 2500Base-KX <full-duplex>
                    status: active
            port10:
                    pvid: 1
                    state=8<FORWARDING>
                    flags=1<CPUPORT>
                    media: Ethernet 2500Base-KX <full-duplex>
                    status: active
            laggroup0:
                    members 9,10
            vlangroup0:
                    vlan: 1
                    members none
            vlangroup1:
                    vlan: 4090
                    members 1,9t,10t
            vlangroup2:
                    vlan: 4091
                    members 2,9t,10t
            vlangroup3:
                    vlan: 30
                    members 3,9t,10t
            vlangroup4:
                    vlan: 40
                    members 4,9t,10t
            vlangroup5:
                    vlan: 50
                    members 5,9t,10t
            vlangroup6:
                    vlan: 60
                    members 6,9t,10t
            vlangroup7:
                    vlan: 2112
                    members 7t,9t,10t
            vlangroup8:
                    vlan: 80
                    members 8,9t,10t
            

            What's odd to me, is the last half, pertaining to vlangroup is way outdated.

            It's odd, but in exact agreement with the switches vlan page.
            switch.vlans.jpg

            In short, to answer your question, apparently I did not. oops.
            I'll do that now.

            P patient0P 2 Replies Last reply Reply Quote 0
            • P
              pfS_noob_cust @pfS_noob_cust
              last edited by

              in. addition, here are the interface vlan & assignments pages...
              interface.vlans.jpg interface.assignments.jpg

              now, nothing plugged into the 7100 switch works.
              I did a reboot just I sent this, but after I "repaired" the Switch VLANs.

              I'll now do a full power off & restart to ascertain the results.

              1 Reply Last reply Reply Quote 0
              • patient0P
                patient0 @pfS_noob_cust
                last edited by patient0

                @pfS_noob_cust said in XG-7100 & Unify console troubles: ix0, ix1, dhcp-kea & now sore head:

                Here's the latter...

                You can format that kind of output with by adding a line before and after that contains only three "`" (Markdown syntax)

                etherswitchcfg
                etherswitch0: VLAN mode: DOT1Q
                port1:
                pvid: 4090
                state=8<FORWARDING>
                flags=0<>
                media: Ethernet autoselect (1000baseT <full-duplex>)
                status: active
                ...
                

                As for the VLANs, now they are numbered different, are you trying to confuse me ;)

                In "Interfaces / Switch / VLANs", all the VLANs you define on "Interfaces / VLANs" do have to exist too.

                For example, the VLAN 622/ngp4_storage is now VLAN 60 on the Switch / VLAN page but still VLAN 622 on the Interfaces / VLAN page.

                Do you mind me asking, how well do you understand VLANs, tagged and untagged, access ports?

                P 1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by stephenw10

                  Yeah you haven't set the PVID on the switch. All the ports are still set to 4091 so no inbound untagged traffic will work. Except on LAN where it's still using 4091.

                  You need to go to Interfaces > Switch > Ports and set the correct PVID for each port.

                  https://docs.netgate.com/pfsense/en/latest/solutions/xg-7100-1u/configuring-the-switch-ports.html#ports

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Ah also the VLAN tags on the switch no longer match the VLANs you have added on lagg0. Previously they did. You'll need to set those back to match.

                    P 1 Reply Last reply Reply Quote 0
                    • P
                      pfS_noob_cust @patient0
                      last edited by

                      @patient0 sorry for being so confusing - not intentional.
                      Stephenw10 pointed out that I my Switch VLANS and Assignment VLANS were out of sync. So "I repaired" that. I believe there remains some mismatches in this area.

                      To answer your last question on "my understanding" - pitiful little, apparently.

                      What I THINK (hoping?) I know is:
                      port 4 (allow all) devices should get 172.16.22.0/24
                      port 5 (allow known) devices should get 172.16.32.0/24
                      port 6 (allow all) devices should get 172.16.62.0/24

                      static mapped "annabelle" as 172.16.62.5 via the port6 dhcp server page.

                      when the 7100 LAN (port 2) has its members identified as:

                      1. 2,9t,10t : dhcp leases reports statically mapped annabelle is up on both the LAN & port 6. But annabelle reports a self assigned IP address. The port 4 device reports not being not connected.

                      2. 2,3t,4t,5t,6t,7t,8t,9t,10t :
                        dhcp leases reports statically mapped annabelle is up on both the LAN & port 6. But annabelle reports a self assigned IP address.
                        The device on port 4 reports a port 5 address, and not one in the pool.

                      Sure seems like the VLANid assignments did not get re-implemented without leaving some conflicting garbage.

                      patient0P 1 Reply Last reply Reply Quote 0
                      • patient0P
                        patient0 @pfS_noob_cust
                        last edited by

                        @pfS_noob_cust I'm sorry but I don't know what to do with these information.

                        I don't think taking about DHCP is necessary right now, first we have to establish if the VLANs are setup correctly.

                        Screenshots of "Interfaces / VLANs", "Interfaces / Switch / VLANs" and "Interfaces / Switch / Ports" please.

                        And then pick one LAN or VLAN to look at. Don't change any VLANs after you posted the screenshots.

                        P 1 Reply Last reply Reply Quote 0
                        • P
                          pfS_noob_cust @stephenw10
                          last edited by

                          @stephenw10 thanks!
                          I failed there too! Didn't understand the switch ports page. fixed that so they match now.
                          switch.vlans.jpg switch.ports.jpg

                          1 Reply Last reply Reply Quote 0
                          • P
                            pfS_noob_cust @patient0
                            last edited by

                            @patient0 I think it's fixed now.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yup looks good.

                              Just for reference the PVID on port 7 doesn't matter because the VLAN there is passed tagged. It usually doesn't hurt to set it there though.

                              P 1 Reply Last reply Reply Quote 0
                              • P
                                pfS_noob_cust @stephenw10
                                last edited by pfS_noob_cust

                                @stephenw10 thank you.
                                Your statement is based on the fact that port 7 is assigned with that VLANid on interface ix0, right? OOPS, Not true.
                                Switch VLANs Group 7 members are are all tagged (7t,9t,10t), right?

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Yes exactly. Since all members of that VLAN are tagged it should never see untagged traffic so the PVID isn't used.

                                  However worth baring in mind is that if the downstream device (a switch I assume) incorrectly sends untagged traffic to port 7 it will be tagged onto VLAN 1221. Now normally that's not a problem since the traffic could only ever be one way. Nothing on VLAN 1221 could ever respond. But if such rogue traffic turned out to be a broadcast flood for example that might start to affect something.

                                  P 1 Reply Last reply Reply Quote 0
                                  • P
                                    pfS_noob_cust @stephenw10
                                    last edited by

                                    @stephenw10

                                    Thank you. I'll try to absorb what you just said.

                                    @patient0,stephenw10,

                                    I do want to express my gratidude for kindly pointing out my failures of execution in utilizing the GUI properly. I fully appreciate the difficulties of writing words that describe the intent of a GUI.
                                    Again, Thanks.

                                    1 Reply Last reply Reply Quote 1
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.