• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

XG-7100 redundant connections to external switches

Scheduled Pinned Locked Moved Official Netgate® Hardware
35 Posts 6 Posters 4.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    BridgeTowerIT
    last edited by Mar 4, 2019, 2:13 AM

    I am in the middle of deploying a set of XG-7100 firewalls and am having some difficulty creating redundant connections to external switches. On previous pfSense firewalls without integrated switches I would setup a LAGG (either failover or LACP depending on the situation) but I don't believe that is an option on the XG-7100 units without using the SFP+ ports (which I plan on reserving for future 10G upgrades and don't currently have modules for anyways).

    At first I thought the lack of ability to create an externally facing LAGG wouldn't be an issue because I would simply add redundant connections from my external switches and let STP sort it out. But after making multiple attempts at this I'm coming to the conclusion that the XG-7100 units don't support STP on the internal switches. Bear in mind that I haven't done a packet capture so I haven't been able to confirm.

    Do the XG-7100 switches support STP? If so, do they support rSTP and what are the other details behind their default configuration? Are configuration changes (priority, port mode, etc) relating to STP support possible?

    Without using STP, SFP+ modules, or other expansion cards is there any other way to create redundant connections to an external switch on the XG-7100?

    1 Reply Last reply Reply Quote 0
    • D
      Derelict LAYER 8 Netgate
      last edited by Derelict Mar 4, 2019, 5:02 AM Mar 4, 2019, 5:01 AM

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • S
        stephenw10 Netgate Administrator
        last edited by Mar 4, 2019, 12:20 PM

        You can configure a LAGG to the onboard switch but it, currently, only supports load-balance mode. That's how the internal LAGG is configured but additional LAGGs to external ports can be set.

        Steve

        1 Reply Last reply Reply Quote 0
        • B
          BridgeTowerIT
          last edited by Mar 5, 2019, 5:26 PM

          Is there any documentation on how to setup additional load-balance LAGGs going out of the internal switch?

          I reviewed the video guide on the switch and it is mentioned but I don't believe it is covered in detail and it doesn't seem obvious how one would configure it. As far as I can tell you can only create LAGGs using unassigned physical interfaces, not the internal switch ports.

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Mar 5, 2019, 5:46 PM

            You just have to add the ports to a new lagg group on the Ports tab i the switches config:

            0_1551807910377_Selection_592.png

            So here ports 7 and 8 are a lagg to another switch or another pfSense box carrying the LAN subnet.

            Steve

            I 1 Reply Last reply Oct 12, 2019, 2:48 PM Reply Quote 0
            • B
              BridgeTowerIT
              last edited by Mar 5, 2019, 7:22 PM

              That make sense.

              Any plans or ability to provide STP or LACP support on the internal switch in the future? I'm not sure if this is a driver or hardware limitation.

              1 Reply Last reply Reply Quote 0
              • S
                stephenw10 Netgate Administrator
                last edited by Mar 5, 2019, 7:46 PM

                Both are being looked at. We would love to have them on the 7100 switch.
                I have not heard anything definite though.

                Steve

                D 1 Reply Last reply Mar 27, 2019, 8:02 PM Reply Quote 0
                • D
                  dragoangel @stephenw10
                  last edited by dragoangel Mar 27, 2019, 8:04 PM Mar 27, 2019, 8:02 PM

                  @stephenw10 actually you give wrong instruction. If you will do change LAGG on ETHn Ports from "-" to anything else yours pfSense WILL STUCK. I tried many cases how configure LAGG on XG-7100 Switch lagg0 and in end: ☠ I loose my network connectivity. So please could you explain how it can work?

                  Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                  Unifi AP-AC-LR with EAP RADIUS, US-24

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Mar 27, 2019, 10:39 PM

                    Not sure I understand.

                    You definitely can configure additional lagg groups on the switch as I showed there.

                    They can't be lagg group 0 as that is already used on the internal ports 9 and 10 to connect to ix2 and ix3.

                    The ports you set that on will be inaccessible until you connect them to a load-balance lagg so don't change it on ports you're using. to access the gui.

                    Steve

                    D 1 Reply Last reply Mar 28, 2019, 7:51 AM Reply Quote 0
                    • D
                      dragoangel @stephenw10
                      last edited by Mar 28, 2019, 7:51 AM

                      @stephenw10 I changed "-" to 1 on two disconnected ports, click "save" and after this all connectivity to xg-7100 brokes. If connect to com port and run ifconfig no second lagg1 will be showed. Only restore to previous configuration with reboot fix issue. I have one xg-7100 not in production and have one cisco sb200fe 48ports to tests.

                      Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                      Unifi AP-AC-LR with EAP RADIUS, US-24

                      1 Reply Last reply Reply Quote 0
                      • D
                        dragoangel
                        last edited by dragoangel Mar 28, 2019, 10:00 AM Mar 28, 2019, 9:59 AM

                        Could you bee so kind and share with me working XG-7100 pfSense configuration backup with factory defaults and configured switch ports:
                        untagged port 3 and 4 to lagg1 on vlan 4091
                        untagged port 5 and 6 to lagg2 on vlan 4091
                        I want connect 3-4 port to #1 cisco switch on lagg. And 5-6 to #2 cisco switch on lagg.

                        Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                        Unifi AP-AC-LR with EAP RADIUS, US-24

                        1 Reply Last reply Reply Quote 0
                        • S
                          stephenw10 Netgate Administrator
                          last edited by Mar 28, 2019, 7:39 PM

                          Configuring and additional lagg group in the switch does not create a new lagg in pfSense Interfaces. It's a lagg only between the switch and whatever is on those ports.

                          The internal switch can only do load-balance lagg. The Cisco switch must also support that.

                          Steve

                          D 1 Reply Last reply Mar 28, 2019, 7:56 PM Reply Quote 0
                          • D
                            dragoangel @stephenw10
                            last edited by Mar 28, 2019, 7:56 PM

                            @stephenw10 yes I know that only LB can be done. No LACP. But still, when I have default hardware and clean OS/config changing "-" to something like 1 on port and click "save" destroy connectivity. So I don't know... Help pls.

                            Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                            Unifi AP-AC-LR with EAP RADIUS, US-24

                            1 Reply Last reply Reply Quote 0
                            • S
                              stephenw10 Netgate Administrator
                              last edited by stephenw10 Mar 29, 2019, 5:12 PM Mar 29, 2019, 5:10 PM

                              Hmm, I see. That was an old config I have on that box.

                              Try running at the console after making the change: etherswitchcfg

                              That will show the current switch settings. Do you see, for example?:

                              laggroup0:
                                      members 5,6,9,10
                              laggroup1:
                                      members 5,6
                              

                              There I added ports 5 and 6 to lagg group 1 but they have been added to group 0 also.
                              If so as a workaround you can set that back to just 9 and 10 using:
                              etherswitchcfg laggroup0 members 9,10

                              Steve

                              D 2 Replies Last reply Mar 29, 2019, 6:02 PM Reply Quote 0
                              • D
                                dragoangel @stephenw10
                                last edited by dragoangel Mar 30, 2019, 11:23 AM Mar 29, 2019, 6:02 PM

                                @stephenw10 ok, thanks. I will try maybe on monday, and will reply. but if I remove 5,6 ports from lagg0 this will be mean that pfSense can't reach them and clients on 5,6 will doesn't reach pfSense. This will be isolated switch, no?
                                And if not remove 5,6 from lagg0 before add to lagg1 it will be collizion? That's why my pfSense was sticking previously...

                                Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                                Unifi AP-AC-LR with EAP RADIUS, US-24

                                1 Reply Last reply Reply Quote 0
                                • D
                                  dragoangel @stephenw10
                                  last edited by Apr 1, 2019, 6:14 PM

                                  @stephenw10 about that you said:

                                  etherswitchcfg laggroup0 members 9,10

                                  I see that this is a BIG 🐛 in pfSense Switch WebConfigurator.
                                  Configuring laggs over shell works fine.
                                  I created bugreport about it - hope they will fix it soon, before this I will use shell for it 😒

                                  Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                                  Unifi AP-AC-LR with EAP RADIUS, US-24

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    stephenw10 Netgate Administrator
                                    last edited by stephenw10 Apr 1, 2019, 6:29 PM Apr 1, 2019, 6:29 PM

                                    It is already fixed in 2.5 snapshots if you're able to try those. It was in fact fixed in 2.4.5 snaps too.

                                    Steve

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      dragoangel
                                      last edited by dragoangel Apr 1, 2019, 7:05 PM Apr 1, 2019, 7:01 PM

                                      https://redmine.pfsense.org/issues/9447 :( wasted time. Ok. Thanks. I better wait for Stable release. I'm now on Latest Base 2.4.4_2. There is known date of 2.4.5 or 2.5 release?

                                      Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                                      Unifi AP-AC-LR with EAP RADIUS, US-24

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        stephenw10 Netgate Administrator
                                        last edited by Apr 1, 2019, 7:12 PM

                                        Not for 2.5 release. I'm not aware of any particular issue with running 2.5 on it currently but things are changing there everyday.

                                        You can set that command to run via the shellcmd package if you wish do you don't have to manually run it boot.
                                        https://docs.netgate.com/pfsense/en/latest/development/executing-commands-at-boot-time.html

                                        Steve

                                        D 1 Reply Last reply Apr 1, 2019, 7:15 PM Reply Quote 0
                                        • D
                                          dragoangel @stephenw10
                                          last edited by dragoangel Apr 1, 2019, 7:15 PM Apr 1, 2019, 7:15 PM

                                          @stephenw10 you mean that etherswitchcfg laggroup1 members 5,6 is not permanent? Ok.

                                          Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
                                          Unifi AP-AC-LR with EAP RADIUS, US-24

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            [[user:consent.lead]]
                                            [[user:consent.not_received]]