Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Traffic Graph and trunk links

    Scheduled Pinned Locked Moved General pfSense Questions
    15 Posts 2 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by

      For context: https://redmine.pfsense.org/issues/14817#change-69947

      Brining it to the forums not for troubleshooting but for confirmation. Traffic Graph is reading traffic essentially off a trunk link but on my dashboard i want to monitor bandwidth across several vlans. The problem is i see my Unifi VLAN which is where the APs are, only have access to the controller on another vlan but the traffic pattern is the exact same as my IoT vlan. In other words if a wireless device on the IoT vlan has a spike in 100Mbps of traffic than that same spike is seen on the Unifi VLAN.
      To my knowledge, there is no user traffic that passes/or should pass through the Unifi management VLAN which ultimately leads me to believe that because this is a Trunk link, Traffic Graph cant distinguish between VLANs so this is really a limitation of it. I would toss it up to a cosmetic issue but its not really.
      @stephenw10 what do you think?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Is it graphing the parent interface or a VLAN on it?

        If it's the parent you might expect to see traffic on VLANs on it.

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @stephenw10
          last edited by

          @stephenw10 Just a VLAN
          So if you see the below screen shot, the interface which is a vlan on a trunk has over 10Mb of traffic but there is no talker that comes up that shows that.
          But if i go on my Wireless IoT vlan, those spikes makse more sense and i see the top talker pulling down 10Mbp of traffic.

          19e0104a-3957-4143-be3a-fee8ec7d326a-image.png

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            That's on the 6100? 7100? What is the parent interface for it? I assume in 23.05.1?

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @stephenw10
              last edited by

              @stephenw10 This is on a 6100 on 23.05.1 Release. igc2 interface

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                This test box is running 23.09, so this might have been fixed already, but do you see that on the dash graphs too?

                Screenshot from 2023-09-29 00-40-51.png

                Those 3 VLANs are on LAN2 which I is what I expect.

                M 1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @stephenw10
                  last edited by michmoor

                  @stephenw10 The dash graphs is how I originally spotted the issue.
                  I then went into Traffic Graph to identify in the UNIFI VLAN what is talking so much and either no IPs show up or if one does it’s below a meg of traffic as I would expect as it’s only APs and switches in that vlan

                  I just took this off my dashboard now. How is the UNIFI vlan pulling down the same traffic level of Kidszone? Same trunk link but different vlan/subnets? Different firewall rulesets. So in theory its not possible to have the same flows.

                  e59c95ce-9c94-4bd3-b6f5-566318f61204-image.png

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Hmm, can you test 23.09? I can't see a bug specifically for this....

                    If not I'll try to replicate in 23.05.1

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @stephenw10
                      last edited by michmoor

                      @stephenw10 Can i use boot environments for this? I got a system that i can throw 23.09 on it but i want to know if its possible to switch back to 23.05.1 if need be and have everything be the way it was once i tested out this issue.

                      edit: unless there is a soon-to-be release in the next few days i can wait. 😊

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Yes you can create a 23.05.1 boot environment and then roll back to it from 23.09.

                        M 1 Reply Last reply Reply Quote 1
                        • M
                          michmoor LAYER 8 Rebel Alliance @stephenw10
                          last edited by michmoor

                          @stephenw10

                          1. During the update i get the error that it failed..

                          811ec8a9-b54e-4a79-812b-bcc1e7f96ebe-image.png

                          After a few minutes i get the email that the Boot UP is complete but the graphing is still broken.

                          0de9b5ac-fd92-4f9e-8441-fae7e161e0db-image.png

                          There is absolutely no way there is 200M of traffic on the Unifi VLAN. Impossible but it matches the spikes of a different VLAN (IoT). Somehow the graphing of the trunk is wrong.

                          I will be switching back to 23.05 now.

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 1
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Hmm. Do you have the parent igc NIC assigned? Does that also show the same traffic?

                            M 1 Reply Last reply Reply Quote 0
                            • M
                              michmoor LAYER 8 Rebel Alliance @stephenw10
                              last edited by michmoor

                              @stephenw10
                              hmmm....
                              igc2 is assigned to the trunk - UNIFI vlan
                              Because Unifi needs to operate on the native vlan i assigned igc2 but it has no vlan assignments.
                              igc2.14 is the IoT vlan

                              Maybe we're on to something here.......

                              21b0aa95-28d9-48be-a90c-074b6586e44c-image.png

                              0ec64cb1-992f-4f80-a431-c692c943d58f-image.png

                              Firewall: NetGate,Palo Alto-VM,Juniper SRX
                              Routing: Juniper, Arista, Cisco
                              Switching: Juniper, Arista, Cisco
                              Wireless: Unifi, Aruba IAP
                              JNCIP,CCNP Enterprise

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by stephenw10

                                Ah, yes, then that's expected. The parent NIC sees the traffic from all VLANs on it. That's exactly what I see above on the graphs here. And why that's the first thing I asked. 😉

                                You should still be able to put client traffic on a VLAN in Unifi and just have the management traffic untagged. Or potentially untag it at a switch in between pfSense and the AP.

                                Steve

                                M 1 Reply Last reply Reply Quote 0
                                • M
                                  michmoor LAYER 8 Rebel Alliance @stephenw10
                                  last edited by

                                  @stephenw10 You did ask i must have misunderstood, my bad on that. But good to know its expected behavior.
                                  Thank you so much for the assist here. Appreciate it!!

                                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                  Routing: Juniper, Arista, Cisco
                                  Switching: Juniper, Arista, Cisco
                                  Wireless: Unifi, Aruba IAP
                                  JNCIP,CCNP Enterprise

                                  1 Reply Last reply Reply Quote 1
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.