Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense 22.05 breaks VLANS, restoring pfSense 22.01 fixes the issue

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    247 Posts 7 Posters 85.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      NRgia @stephenw10
      last edited by NRgia

      @stephenw10
      Uploaded the files.
      They're named:

      1. "nrgia_super_micro_status_output.tar.gz"
      2. "nrgia_supermicro_config-today-20220708193221.xml" - the config file

      If something is missing due to editing, please let me know, and I can upload it again.

      I hope all it's good in the config. I will wait for your conclusions.
      Thank you

      1 Reply Last reply Reply Quote 1
      • N
        NRgia @stephenw10
        last edited by

        @stephenw10
        Sorry to bother you, did you had time to look over those files? Or, more time is needed? I can wait, no worries.
        Thank you

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Sorry I haven't had time yet. I should be able to review that shortly....

          N 2 Replies Last reply Reply Quote 0
          • N
            NRgia @stephenw10
            last edited by

            @stephenw10
            take your time
            Thank you

            1 Reply Last reply Reply Quote 0
            • N
              NRgia @stephenw10
              last edited by NRgia

              @stephenw10
              Investigating the config file was indeed a good idea, and, in the end I found the culprit.
              It's not pfSense, it's the Driver

              In my config, I have done some NIC optimization a while ago, and for that I used shellcmd, to run it after boot.

              You can see it here:

              <shellcmd>ifconfig ix2 -txcsum -rxcsum -tso4 -tso6 -lro -txcsum6 -rxcsum6 -vlanhwtso -vlanhwfilter -vlanhwtag -vlanhwcsum</shellcmd>
              

              Now, to explain why I did the above.
              In 2.6.0 or earlier, I don't remember exactly,(at least for my driver) Suricata did not pass traffic for VLANs, enabled on the parent interface. In order to solve that I wrote the above.

              In 22.05 though, I had to add "vlanhwtag" again, otherwise even with Suricata uninstalled, no VLANs traffic will pass through.

              I played with others tags, the only one that I must leave enabled is "vlanhwtag".

              So the issues with the VLANs are solved, but now I cannot run Suricata in Inline mode with "vlanhwtag" enabled,(it will not pass traffic) or at least that is how it worked for me in previous versions.

              Many thanks to @johnpoz and @stephenw10 for investigating with me.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Huh, that's fascinating. So as long as you do not disable hardware VLAN tagging on ix2 the VLANs work? And presumably a pcap no longer shows VLAN0 tagged traffic?

                That's almost the opposite of what I'd expect.... ๐Ÿค”

                I was never able to replicate it here.

                N 1 Reply Last reply Reply Quote 0
                • N
                  NRgia @stephenw10
                  last edited by NRgia

                  @stephenw10 said in pfSense 22.05 breaks VLANS, restoring pfSense 22.01 fixes the issue:

                  Huh, that's fascinating. So as long as you do not disable hardware VLAN tagging on ix2 the VLANs work? And presumably a pcap no longer shows VLAN0 tagged traffic?

                  That's almost the opposite of what I'd expect.... ๐Ÿค”

                  I was never able to replicate it here.

                  The results are like this:

                  1. Disable "vlanhwtag" - the VLAN traffic will cease almost immediately, and also the pcap shows VLAN0 again.
                  2. Enable "vlanhwtag" - the VLAN traffic will work, and pcap will not show any VLAN0 anymore.

                  In 22.01 this did not happen with or without "vlanhwtag" .

                  The only inconvenient now is that I cannot run Suricata in Inline mode. I mean, I can, but the traffic for VLANS will not work. Only in legacy mode.

                  Other than that no complaints.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Wow. Boom!

                    20:30:18.349238 00:51:82:11:22:02 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 68: vlan 0, p 0, ethertype 802.1Q, vlan 1001, p 0, ethertype ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 10.101.0.1 tell 10.101.0.12, length 46
                    

                    That's crazy! Time to dig deeper...

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @stephenw10
                      last edited by

                      @stephenw10 so you were able to duplicate it then?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Yup. Bizarre. I would have sworn it wasn't real but...

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @stephenw10
                          last edited by johnpoz

                          @stephenw10 well guess you got a new "toy" to play with then - figuring out.. Can't wait to hear what you discover on what/how/why this happens..

                          So does this happen on other then ix nics? Could I remove the vlanhw setting on say an interface on my sg4860 and see this happening with vlan0? I assume you have already tried that?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by stephenw10

                            Not yet, feel free ๐Ÿ˜‰
                            The same patch or something close to it went into all the Intel drivers so...possibly. Though it seems unlikely no-one would have hit it in igb.

                            Edit: igb in current 2.7 snapshots appears unaffected.

                            https://redmine.pfsense.org/issues/13381

                            N 1 Reply Last reply Reply Quote 0
                            • N
                              NRgia @stephenw10
                              last edited by

                              @stephenw10 said in pfSense 22.05 breaks VLANS, restoring pfSense 22.01 fixes the issue:

                              Not yet, feel free ๐Ÿ˜‰
                              The same patch or something close to it went into all the Intel drivers so...possibly. Though it seems unlikely no-one would have hit it in igb.

                              Edit: igb in current 2.7 snapshots appears unaffected.

                              https://redmine.pfsense.org/issues/13381

                              Wow, I'm glad that this ended up with a defect. It took a while :) Do you think this is something that can be fixed by Netgate or we should wait for an upstream fix?

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Almost certainly upstream. Need to confirm it still exists in FreeBSD head first though.

                                N 1 Reply Last reply Reply Quote 0
                                • N
                                  NRgia @stephenw10
                                  last edited by

                                  @stephenw10 said in pfSense 22.05 breaks VLANS, restoring pfSense 22.01 fixes the issue:

                                  Almost certainly upstream. Need to confirm it still exists in FreeBSD head first though.

                                  Thanks again for the support, let's hope it will not take 5 years :) . Yes I know, it's out of your hands.

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Mmm, this is the most interesting issue I've seen in a while!

                                    You need to disable vlan hardware tagging for Suricata to be able to see the traffic? Is that is you run Suricata on the parent NIC only?

                                    N 2 Replies Last reply Reply Quote 0
                                    • N
                                      NRgia @stephenw10
                                      last edited by NRgia

                                      @stephenw10 said in pfSense 22.05 breaks VLANS, restoring pfSense 22.01 fixes the issue:

                                      Mmm, this is the most interesting issue I've seen in a while!

                                      You need to disable vlan hardware tagging for Suricata to be able to see the traffic? Is that is you run Suricata on the parent NIC only?

                                      Exactly, I'll try to explain better.
                                      For 22.01 I found a workaround in order for the Suricata package to not break VLAN traffic.

                                      For that I disabled the vlanhwtag.

                                      If I left vlanhwtag enabled, only traffic from the parrent interface will pass.

                                      Suricata is enabled only on the parent interface, as @bmeeks recommends.

                                      On 22.05 I cannot apply the same workaround anymore, due to, when I disable vlanhwtag, that VLAN0 will appear and VLANs traffic will cease, even with Suricata uninstalled.

                                      1 Reply Last reply Reply Quote 1
                                      • N
                                        NRgia @stephenw10
                                        last edited by

                                        @stephenw10
                                        I saw you commented on this defect
                                        https://redmine.pfsense.org/issues/13381

                                        that you tested on FreeBSD 14

                                        The behavior is the same?

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          It is the same in FreeBSD 14 snapshots yes. We are looking at the best way to handle it.

                                          N 1 Reply Last reply Reply Quote 1
                                          • N
                                            NRgia @stephenw10
                                            last edited by NRgia

                                            @stephenw10
                                            Was this https://reviews.freebsd.org/D36139
                                            rejected and closed or rejected and closed ?
                                            Just wanted to make sure it wasn't rejected and closed.
                                            Thank you

                                            R 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.