Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Steelhead CX770 Port issues

    Scheduled Pinned Locked Moved Hardware
    17 Posts 2 Posters 146 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S Offline
      stephenw10 Netgate Administrator
      last edited by stephenw10

      OK, so both boxes are configured the same?

      How are the ports setup in each case? 5 internal subnets and 1 WAN?

      If you can access the webgui but nothing else it pretty much has to be a config issue.

      martimunM 1 Reply Last reply Reply Quote 0
      • martimunM Offline
        martimun @stephenw10
        last edited by

        @stephenw10, on the firewall that's online, there are 7 VLANs all in igb0 (LAN0_0). That is working without any issues. On the firewall I'm trying to bring online, I configured it exactly the same but all VLANs are on igb5 (AUX). On both cases the there is only one WAN port configured with static IP addresses provided by my ISP. The inter-VLAN rules are exactly the same on both firewalls. The rules are the same throughout all VLANs with the exception of VLAN 101 and 401. Those two VLANs have additional ports open for the Omada Controller.
        Both firewalls show the same issue, though. The only ports fully functional are igb4 (PRI) and igb0 (LAN0_0). Oh, the firewall currently online is running pfSense+ 25.07.1. Since I'm not able to get another pfSense+ software, I need to downgrade to version CE 2.8; that's the whole point on bringing the other firewall online. Since I'm bringing a new firewall online, I thought about using the ports the way it makes sense to me. After the softrware is downgraded to CE 2.8, I'm planning on using both firewalls in a HA configuration.

        I'll bet anything (well, almost everything) that if I switch the LAN port to igb0 on the new firewall, everything will work without any issue. While that is a logical solution, it still leaves me with unusable ports.

        Martin M. Mune
        US Army Combat Veteran
        Operation Iraqi Freedom

        Volunteer Soldier
        International Legion for the Defense of Ukraine

        Слава Україні!
        Героям Слава!

        1 Reply Last reply Reply Quote 0
        • stephenw10S Offline
          stephenw10 Netgate Administrator
          last edited by

          Just to be clear though on the new device you are able to access the webgui using a client connected to a VLAN on igb5?

          On any/all VLAN there?

          If you're able to do that then it isn't a problem with the port or the NIC driver. It pretty much has to be a config issue at that point.

          So a bad subnet mask somewhere or a missing route etc.

          What error do you get when you try to connect to something external?

          martimunM 1 Reply Last reply Reply Quote 0
          • martimunM Offline
            martimun @stephenw10
            last edited by

            @stephenw10, no, I'm not able to access the webui from any VLAN on igb5 even though the rules and everything else are the same with the firewall already working with the VLANs on igb0. I have attached the rule set from the firewall that works with the VLANs attached to igb0.

            floating rules.png sync rules.png vlan101 rules.png vlan201 rules.png vlan401 rules.png vlan501 rules.png vlan601 rules.png

            Also, the following image shows you how the new firewall is configured:

            interfaces.png

            Let me know if you need any additional information.

            Martin M. Mune
            US Army Combat Veteran
            Operation Iraqi Freedom

            Volunteer Soldier
            International Legion for the Defense of Ukraine

            Слава Україні!
            Героям Слава!

            stephenw10S 1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator @martimun
              last edited by

              @martimun said in Steelhead CX770 Port issues:

              I'm not able to access the webui from any VLAN on igb5

              Ah OK. Can you ping any IP on pfSense even? Do clients on those VLANs get a DHCP lease in the correct subnet? (assuming dhcp is in use).

              Or do clients on LAN_AUX work? So using igb5 but without VLAN tagging?

              martimunM 1 Reply Last reply Reply Quote 0
              • martimunM Offline
                martimun @stephenw10
                last edited by

                @stephenw10, on the firewall where the VLANs are on port igb0 yes, I can. When connecting my laptop to LAN_AUX, I assign an IP address in the range of the IP address on LAN_AUX. The gateway is the .254 IP address that LAN_AUX has assigned. The only thing I can do is connect to the webui interface. I have tried every single possible combination imaginable. I even configured a Dell Force10 S55T spare with the same config as my production switch just to make sure there is nothing wrong with the switch config.

                Just for testing purposes, I'll switch all VLANs on the new firewall to port igb0 (like in the firewall in production) just to confirm that the new firewall works as intended. If that works, that means there is something really weird going on with the igb5, igb1, igb2, and igb3 on the actual hardware. That's why I posted in this forum; since this particular Steelhead device is fairly popular as a pfSense firewall/router and knowing that people got them to work successfully, I'd like to see if someone here can sort me out.

                Martin M. Mune
                US Army Combat Veteran
                Operation Iraqi Freedom

                Volunteer Soldier
                International Legion for the Defense of Ukraine

                Слава Україні!
                Героям Слава!

                1 Reply Last reply Reply Quote 0
                • stephenw10S Offline
                  stephenw10 Netgate Administrator
                  last edited by

                  Hmm, sure seems like something low level not working with that port.

                  So you are not using pfSense as the DHCP server for those subnets?

                  martimunM 1 Reply Last reply Reply Quote 0
                  • martimunM Offline
                    martimun @stephenw10
                    last edited by

                    @stephenw10, no. I have a pair of Windows domain controllers doing DHCP duty. On the production firewall, all nodes in every VLAN can get a DHCP lease except for VLAN 101. That's the server VLAN and every node has its own static IP address. I have to agree; there is something really wrong with the ports at the hardware level. And, it's not just one port; it's four of them and in two different units. Too much of a coincidence if you ask me. Yesterday, I haven't had time to transfer the VLANs to the igb0 port on the firewall that I'm bringing online. Later today, I'll do the transfer and report back with the results.

                    Martin M. Mune
                    US Army Combat Veteran
                    Operation Iraqi Freedom

                    Volunteer Soldier
                    International Legion for the Defense of Ukraine

                    Слава Україні!
                    Героям Слава!

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S Offline
                      stephenw10 Netgate Administrator
                      last edited by

                      Yeah I mean this really seems like it's the bypass NICs at work to me. Except that you confirmed pfSense sees igb5 get and lose link when you connect to it?

                      If so then I would run a packet capture on igb5 to see if anything is actually coming in on it.

                      The fact you can connect to the gui but only the gui on igb1 pretty much has to be a firewall rule issue.

                      martimunM 1 Reply Last reply Reply Quote 0
                      • martimunM Offline
                        martimun @stephenw10
                        last edited by

                        @stephenw10, since I'll be switching interfaces, I'll also do a full reset of the firewall so I can reenter all rules. I'll also run Wireshark on the new firewall to see how things flow (or not!) through the ports. It really is a shame that these ports are not working as expected because the hardware is rock solid for a pfSense install. At least I can feel good that I purchased these two CX770s brand new as a bundle for only $100 on eBay. They came from a government surplus site in their original box and all the accessories.

                        Martin M. Mune
                        US Army Combat Veteran
                        Operation Iraqi Freedom

                        Volunteer Soldier
                        International Legion for the Defense of Ukraine

                        Слава Україні!
                        Героям Слава!

                        1 Reply Last reply Reply Quote 1
                        • stephenw10S Offline
                          stephenw10 Netgate Administrator
                          last edited by

                          Mmm, all the by-pass ports I've ever encountered disconnect the internal interfaces when they are in by-pass mode. But I could imagine (maybe) a mode where it loops back the data lines while the MII connections from the PHY still report the link status. But for that to happen you would need both NICs in the by-pass pair to be linked.

                          martimunM 1 Reply Last reply Reply Quote 0
                          • martimunM Offline
                            martimun @stephenw10
                            last edited by

                            @stephenw10, just finished switching all VLANs to the igb0 port. Guess what? ! It all works without any issues. Something is very wrong with the ports. It's not just the bypass ports; the AUX (igb5) which is controlled separately doesn't work. At this point I'm out of ideas. I also ran Wireshark and all traffic stops at the igb5 port. ICMP and HTTP traffic successfully reach the IP address on igb5 but nothing else goes through. I rechecked the BIOS settings to make sure the igb0-3 are not in bypass mode.

                            Anyone who has gotten a CX770 to work successfully, I would appreciate any assistance you can give. This is truly bizarre!

                            Martin M. Mune
                            US Army Combat Veteran
                            Operation Iraqi Freedom

                            Volunteer Soldier
                            International Legion for the Defense of Ukraine

                            Слава Україні!
                            Героям Слава!

                            stephenw10S 1 Reply Last reply Reply Quote 0
                            • stephenw10S Offline
                              stephenw10 Netgate Administrator @martimun
                              last edited by

                              @martimun said in Steelhead CX770 Port issues:

                              I also ran Wireshark and all traffic stops at the igb5 port. ICMP and HTTP traffic successfully reach the IP address on igb5 but nothing else goes through

                              When testing from where?

                              martimunM 1 Reply Last reply Reply Quote 0
                              • martimunM Offline
                                martimun @stephenw10
                                last edited by

                                @stephenw10, everything was working and when I returned to the laptop directly connected to the CX770, nothing worked anymore. When I looked at the NAT setting on the working firewall, I noticed a couple rules that were created automatically. On the new firewall (pfSense CE 2.8.1), even though it was set to automatically create NAT rules, it wasn't creating them. As soon as I put NAT rules in place for all the nets everything started working! I'm streaming a series and watched three episodes without any interruptions. Now I'm happy.

                                The firewall that was in place and running on pfSense+, I need to downgrade. The original plan was to use igb4 for the WAN (which works) and igb4 for the LAN. I'll create the NAT rules manually so I can, hopefully, rule out the NAT config.

                                Is it possible that there may be a glitch with pfSense CE and automatic NAT rules? pfSense+ did not have this issue.

                                Stephen, let me finish rebuilding the firewall so I can post the results here. Once all is clear this subject can be closed. Thank you so much for all the feedback and assistance.

                                Martin M. Mune
                                US Army Combat Veteran
                                Operation Iraqi Freedom

                                Volunteer Soldier
                                International Legion for the Defense of Ukraine

                                Слава Україні!
                                Героям Слава!

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.