• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Unable to reassign network port

General pfSense Questions
5
61
3.3k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    michmoor LAYER 8 Rebel Alliance @stephenw10
    last edited by Feb 9, 2023, 1:40 AM

    @stephenw10 said in Unable to reassign network port:

    Ok, first I have to apologise because I failed to notice your config had spoofed the WAN MAC. So for a very brief period after I uploaded it onto a 6100 here the block rule I had added was for the wrong IP and it had outbound access. So I hope it didn't cause you any issues if it updated your dyndns with my IP for example.

    That was you?!?!? Just kidding i didnt notice any outage on my end 😊

    Im going to disable pfBlocker first. Bringing down the WireGuard tunnels i lose access to my VPC.
    I'll test and let you know.

    Firewall: NetGate,Palo Alto-VM,Juniper SRX
    Routing: Juniper, Arista, Cisco
    Switching: Juniper, Arista, Cisco
    Wireless: Unifi, Aruba IAP
    JNCIP,CCNP Enterprise

    M 1 Reply Last reply Feb 9, 2023, 2:43 AM Reply Quote 1
    • M
      michmoor LAYER 8 Rebel Alliance @michmoor
      last edited by Feb 9, 2023, 2:43 AM

      @michmoor Disabled both packages and tested. No change.
      Another thing i have found through my testing. If i disable the interface. Then go to the vlan and change the description, the changes stick in the GUI. 🀷

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      M 1 Reply Last reply Feb 9, 2023, 5:29 PM Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @michmoor
        last edited by michmoor Feb 9, 2023, 5:30 PM Feb 9, 2023, 5:29 PM

        I suppose we should close this out here and these are my conclusions. Just to note this can be replicated to another 6100 but others cannot replicate it. So this issue varies between devices.

        1. VLAN description changes cannot happen while the Interface is enabled. I first have to disable the interface, go back to the VLAN assignments and change the description there. Enable the interface again.

        2. Any changes to the LAGG [adding a vlan, deleting a vlan, changing description] causes the LAGG to bounce. Any connectivity riding that LAGG will experience an outage. It shouldn't be like this as other vendors do not function like this so this really should be looked at. Its possible for other vendors to write proprietary code for LAGGs to avoid this issue?

        3. Late last night i discovered that if you do not use a LAG but instead use a single interface trunked. any changes made to that trunk interface will result in a link bounce. Again, it shouldnt be this way but i managed to replicate it on another device.

        Overall, using trunked interfaces on pf is very risky in a production environment as any changes to it result in a momentary blip. I am curious if this would happen to me on a 4100 as that has different NIC drivers i believe. I still strongly suspect the NIC is the issue.

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • S
          stephenw10 Netgate Administrator
          last edited by Feb 9, 2023, 6:05 PM

          The 4100 uses identical NICs to the 6100 (and 8200).

          The config not applying has to be a result of one the packages you have installed. If you removed all the packages you would be at the same point I was testing from (almost) where it does not happen.

          Steve

          M 1 Reply Last reply Feb 9, 2023, 8:05 PM Reply Quote 1
          • M
            michmoor LAYER 8 Rebel Alliance @stephenw10
            last edited by Feb 9, 2023, 8:05 PM

            @stephenw10 I'm really beginning to dislike the fact you are always right 😊

            I removed pfblockerNG
            login-to-view

            I then went in to change the vlan description and wouldnt you know it.......Applied right away.

            There is still an outage tho.
            login-to-view

            So this leaves me with two questions

            1. where do we go from here? Do i reach out to the package maintener to describe the problem and see if theres a fix?
            2. Is the port flapping just what happens and thats the nature of how lagg is implemented?

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 0
            • S
              stephenw10 Netgate Administrator
              last edited by Feb 9, 2023, 8:32 PM

              Ah, that's interesting...hmm let me think about that. It could be simply the time it takes to reload everything some how. I assume you do not see it take 5mins to reload the filter when pfBlocker is populated correctly?

              Applying changes to a VLAN on the LAGG is likely to bounce the LAGG because it reapplies the interfaces and the properties are inherited. I'm not sure if that can be prevented entirely.

              M 1 Reply Last reply Feb 9, 2023, 8:41 PM Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @stephenw10
                last edited by Feb 9, 2023, 8:41 PM

                @stephenw10 does it take a long time for pfblocker to update you mean? No it’s quick. Maybe a minute or 2 at the most.
                Can you load pfblocker on your test device and replicate?

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • S
                  stephenw10 Netgate Administrator
                  last edited by Feb 9, 2023, 10:16 PM

                  No I mean the filter load so if you go to Status > Filter Reload and initiate the load how long does it take? It should be seconds.

                  M 1 Reply Last reply Feb 9, 2023, 11:08 PM Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @stephenw10
                    last edited by Feb 9, 2023, 11:08 PM

                    @stephenw10 Ah. Right now without pfblockerNG installed. Seconds. Max 5s or so.

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    M 1 Reply Last reply Feb 16, 2023, 12:08 AM Reply Quote 1
                    • M
                      michmoor LAYER 8 Rebel Alliance @michmoor
                      last edited by Feb 16, 2023, 12:08 AM

                      @stephenw10 You are not going to believe this [or maybe you will]. Upgraded to 23.01. Installed pfblocker [not ng version].
                      All problems have now went away. I am able to change vlan descriptions with pfblcoker installed AND the lagg doesn't bounce when you do it....
                      At the very least there was clearly some buggy/inconsistent behavior on 22.05 but on 23.01 all the problems noted above are now gone. LAGG is stable regardless of changes made.

                      You have no idea how relieved i am on all this. I do deploy LAGGs and its just terrifying that i couldn't make a change unless im under a maintenance window.

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      1 Reply Last reply Reply Quote 0
                      • S
                        stephenw10 Netgate Administrator
                        last edited by Feb 16, 2023, 12:50 AM

                        Nice! Yeah the changes to 23.01 are large and extensive. It doesn't surprise me that the issue has changed. It would have been nice to know exactly what was happening there but it's probably not worth digging much further unless it reappears.

                        Steve

                        M 1 Reply Last reply Feb 16, 2023, 2:22 AM Reply Quote 1
                        • M
                          michmoor LAYER 8 Rebel Alliance @stephenw10
                          last edited by Feb 16, 2023, 2:22 AM

                          @stephenw10 appreciate you Stephen. Thanks for all the support !

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 0
                          59 out of 61
                          • First post
                            59/61
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.