• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Connecting Cisco switch to pfsense difficulty.

L2/Switching/VLANs
2
18
927
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    johnpoz LAYER 8 Global Moderator @stampeder
    last edited by johnpoz Sep 12, 2024, 5:11 PM Sep 12, 2024, 5:08 PM

    @stampeder in your drawing you said you had both vlan 100 and 1000 on both 1 and 2, but your switch config only shows vlan 1000.. Yeah you should add vlan 100 as native, ie untagged.. If you send it tagged then both your test devices would need to be setup to understand the tag.

    Also all of your ports are misconfigured - you can't be in mode trunk with access vlan like that.

    For a trunk port you would have allowed vlans, like in my example - if you want one of those untagged then you would set that vlan as native.

    An intelligent man is sometimes forced to be drunk to spend time with his fools
    If you get confused: Listen to the Music Play
    Please don't Chat/PM me for help, unless mod related
    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

    S 1 Reply Last reply Sep 12, 2024, 6:52 PM Reply Quote 0
    • S
      stampeder @johnpoz
      last edited by stampeder Sep 12, 2024, 7:29 PM Sep 12, 2024, 6:52 PM

      @johnpoz Doah....It has been a long time since I configured a Cisco switch.......So, traffic between the two UUT devices should just pass right through the switch on ports 1 and 2. So I really don't need to set port 100 as native on these two ports. What I do need to configure is for port eth1/1 and eth1/2 to pass all vlans.
      As for eth1/3 I will set it as native vlan 100. Does this look correct:

      login-to-view

      Comments?

      J 1 Reply Last reply Sep 12, 2024, 7:26 PM Reply Quote 0
      • J
        johnpoz LAYER 8 Global Moderator @stampeder
        last edited by johnpoz Sep 12, 2024, 7:33 PM Sep 12, 2024, 7:26 PM

        @stampeder if they were access then sure ok.. But if your going to trunk a port, you have to allow the vlan - but it switch would expect a tag.. If you want a vlan to be untagged, then you would need to set the native, unless its using the default vlan on the switch.

        You wouldn't need to set native on port 3, its in access mode - you would just put it in the vlan on the switch you want that traffic to be on, ie 100 I take it.. And make sure the pvid is 100 as well. cisco would normally set that for you when you set it to access mode and put it in vlan X, etc.

        If you want device to see untagged traffic on that trunk, that would be the native vlan for that port. For it to do anything with vlan 1000 then the device would have to be setup to understand the tag and send whatever traffic you want on 1000 with a tag.. That would be done on the device.

        that example I gave above is an AP, it has a management IP that is my vlan 2 on the switch.. but I also send tagged traffic to it and get tagged traffic from it for its wifi networks it handles via different ssids..

        So yeah the to talk to the AP management IP that traffic has to be untagged.

        Your config for 1 and 2 would work if the devices are sending tags for the traffic you want on vlan 100.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        S 1 Reply Last reply Sep 12, 2024, 7:42 PM Reply Quote 0
        • S
          stampeder @johnpoz
          last edited by stampeder Sep 12, 2024, 7:43 PM Sep 12, 2024, 7:42 PM

          @johnpoz So the traffic between eth1/1 and eth1/2 has two vlans (100 and 1000). Hence I believe they should be trunk ports which allow both vlans.
          The traffic coming out of port eth1/3 has only the vlan 100 traffic on it (this is my inband management) Vlan 100 uses the network ip of 172.16.95.0/24. This connects to the pfsense box on my ETX lan port. This is where I am a little confused.
          Here is what I have so far:

          login-to-view
          According to what I am reading the ETX lan port expected native vlan (ie untagged traffic).
          When I first configured my 3048 switch I had port 3 set to switchport access. Should I be reverting eth1/3 on the 3048 to an access port? How will I tell it to pass only vlan 100 traffic?
          Sorry to be so thick on this. But I am getting closer. I appreciate your patience....

          J 1 Reply Last reply Sep 12, 2024, 7:47 PM Reply Quote 0
          • J
            johnpoz LAYER 8 Global Moderator @stampeder
            last edited by Sep 12, 2024, 7:47 PM

            @stampeder if the only traffic on port 3 is going to be vlan 100, and untagged then yes that would be a access port in vlan 100.

            If you want untagged traffic on trunk port, you will need to set vlan 100 as native.. on your trunk ports

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            S 1 Reply Last reply Sep 12, 2024, 8:04 PM Reply Quote 0
            • S
              stampeder @johnpoz
              last edited by stampeder Sep 12, 2024, 8:10 PM Sep 12, 2024, 8:04 PM

              @johnpoz I set eth1/3 to mode access. I specified vlan 100. So with this connected to pfsense on my ETX port I should be able to go into Diagnostics and ping UUT#1 at 172.16.95.120:

              login-to-view

              However, my pings come back as 100% loss. Where am I going wrong in this? I have my firewall rules set to pass any to any.

              BELAY THAT ORDER SAILOR....IT WORKS....
              I had my lan plugged into the wrong port on the 3048. Once I plugged into the correct port the ping works like a charm on both UUT's.
              You are my new hero.
              THANKS SO MUCH FOR ALL YOUR HELP. Colour me one happy camper!!

              J 1 Reply Last reply Sep 12, 2024, 8:13 PM Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator @stampeder
                last edited by johnpoz Sep 12, 2024, 8:21 PM Sep 12, 2024, 8:13 PM

                @stampeder pinging what from where? Your trunks on 1 and 2 are still not right.. If the device is not sending a tag with its vlan 100 traffic its not going anywhere.. And if you ping from pfsense to one of the device, that traffic to the device would be tagged. And the device wouldn't see it, etc..

                You need to set your ports 1 and 2 to be native vlan 100 so that traffic is not tagged, and any untagged traffic that enters the port from the device will be put on vlan 100.

                edit: its not going to work like that.. unless your default vlan on the switch is 100? The default vlan on a trunk would be untagged.

                Can you do say this command

                sg300-28#sho interfaces switchport gi14 
                Added by: D-Default, S-Static, G-GVRP, R-Radius Assigned VLAN, T-Guest VLAN, V-Voice VLAN
                Port : gi14
                Port Mode: Trunk
                Gvrp Status: disabled
                Ingress Filtering: true
                Acceptable Frame Type: admitAll
                Ingress UnTagged VLAN ( NATIVE ): 2
                 
                Port is member in: 
                 
                Vlan               Name               Egress rule     Added by     
                ---- -------------------------------- ----------- ---------------- 
                 2                 Wlan                Untagged          S         
                 4                W_PSK                 Tagged           S         
                 6               W_Guest                Tagged           S         
                 7                W_Roku                Tagged           S         
                 9                  9                   Tagged           D         
                110               W_Cam                 Tagged           S         
                
                 
                Forbidden VLANS: 
                Vlan               Name               
                ---- -------------------------------- 
                
                 
                

                I not sure if I have access to a NX3048 in work network, and don't for sure have one at home.. We have 7k and 9k etc.., would have to look if any of those old switches are still in use, so not 100% sure that command is valid on them..

                But notice that it lists vlan 9, that is the default vlan on my switch.. But I don't want untagged traffic to be on vlan 9, I want it on vlan 2 which is why I set native to 2.. Your config works if your default vlan is 100 on your switch.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                S 1 Reply Last reply Sep 12, 2024, 8:19 PM Reply Quote 0
                • S
                  stampeder @johnpoz
                  last edited by Sep 12, 2024, 8:19 PM

                  @johnpoz Crap. I spoke too soon. When I issued the ping it was from source autoselect which I believe was issued from the gateway of the ETX port.
                  Anyway when I used source as LAN it of course did not work as you pointed out.
                  I"ll go an add the vlan 100 as native on both eth1/1 and eth1/2. I'm assuming that all I have to add to eth1/1 and eth1/2 is"switchport trunk native vlan 100" I should also remove the vlan 100 from the "trunk allowed vlan" line?

                  J 1 Reply Last reply Sep 12, 2024, 8:23 PM Reply Quote 0
                  • J
                    johnpoz LAYER 8 Global Moderator @stampeder
                    last edited by Sep 12, 2024, 8:23 PM

                    @stampeder no you shouldn't have to remove it.. notice my command for allowed is an add, not a direct allowed list.. Your still going to want to allow the vlan..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    S 1 Reply Last reply Sep 12, 2024, 8:31 PM Reply Quote 0
                    • S
                      stampeder @johnpoz
                      last edited by stampeder Sep 12, 2024, 8:56 PM Sep 12, 2024, 8:31 PM

                      @johnpoz I tried to change the vlan allowed statement to add in eth1/1 and eth1/2. However, it doesn't appear the NX-OS 9.3 allows it as a config statement. Turns out one has to do the vlan add statement using the port-channel interface.
                      I'm off to do a bunch of reading on how to use the port-channel interface in NX-OS.
                      Isn't this fun.,....

                      J 1 Reply Last reply Sep 12, 2024, 9:09 PM Reply Quote 0
                      • J
                        johnpoz LAYER 8 Global Moderator @stampeder
                        last edited by johnpoz Sep 12, 2024, 9:18 PM Sep 12, 2024, 9:09 PM

                        @stampeder huh, those ports are not in a port channel.

                        conf t
                        interface ethernet1/1
                        switchport trunk native vlan 100

                        Keep in mind not sure what differences there might be with NX-OS 9.3

                        edit:

                        here
                        https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus3000/sw/layer2/503_U1_1/b_Cisco_n3k_layer2_config_gd_503_U1_1/b_Cisco_n3k_layer2_config_gd_503_U1_1_chapter_0101.html

                        login-to-view

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        S 1 Reply Last reply Sep 13, 2024, 2:53 PM Reply Quote 0
                        • S
                          stampeder @johnpoz
                          last edited by Sep 13, 2024, 2:53 PM

                          @johnpoz Thanks for this and your patience. I have definitely been working on NetGear, TP-Link an Zyxel managed switches for too long and forgot all my Cisco commands stuff. Ignore my comment about port channel as I was reading about how to add a vlan to a trunk port.
                          My switch is doing some weird things. If I add a description of say port eth1/1 the running-config will display what I entered. If however I enter the command:
                          switchport trunk allowed vlan add 1000
                          the command does not show up on the running-config listing. If however I enter the command:
                          switchport trunk allowed vlan 100,1000
                          this command does NOT show up on the running-config listing even though according to the Cisco Nexus 3000 Series NX-OS Layer 2 Switching Configuration Guide, Release 9.2(x) it is an allowed command:
                          Configuring the Allowed VLANs for Trunking Ports
                          You can specify the IDs for the VLANs that are allowed on the specific trunk port.

                          Before you configure the allowed VLANs for the specified trunk ports, ensure that you are configuring the correct interfaces and that the interfaces are trunks.

                          SUMMARY STEPS
                          switch# configure terminal
                          switch(config)# interface {type slot/port | port-channel number}
                          switch(config-if)# switchport trunk allowed vlan {vlan-list all | none [add |except | none | remove {vlan-list}]}
                          DETAILED STEPS
                          Command or Action Purpose
                          Step 1
                          switch# configure terminal

                          Enters global configuration mode.

                          Step 2
                          switch(config)# interface {type slot/port | port-channel number}

                          Specifies an interface to configure, and enters interface configuration mode.

                          Step 3
                          switch(config-if)# switchport trunk allowed vlan {vlan-list all | none [add |except | none | remove {vlan-list}]}

                          Sets allowed VLANs for the trunk interface. The default is to allow all VLANs on the trunk interface: 1 to 3967 and 4048 to 4094. VLANs 3968 to 4047 are the default VLANs reserved for internal use by default; this group of VLANs is configurable. By default, all VLANs are allowed on all trunk interfaces.

                          Note
                          You cannot add internally allocated VLANs as allowed VLANs on trunk ports. The system returns a message if you attempt to list an internally allocated VLAN as an allowed VLAN.

                          Example
                          This example shows how to add VLANs to the list of allowed VLANs on an Ethernet trunk port:

                          switch# configure terminal
                          switch(config)# interface ethernet 1/3
                          switch(config-if)# switchport trunk allow vlan 15-20

                          Do you think that as it says "The default is to add all VLANS" that it doesn't store it because it is already allowed?

                          I'm going to go back to the start of our conversation and reread it all. I think I am missing something.
                          By the way my name is Glenn....

                          J 1 Reply Last reply Sep 13, 2024, 3:07 PM Reply Quote 0
                          • J
                            johnpoz LAYER 8 Global Moderator @stampeder
                            last edited by johnpoz Sep 13, 2024, 3:08 PM Sep 13, 2024, 3:07 PM

                            @stampeder Not sure what your going on to be honest.. You have gone down some rabbit hole of your own making... I have told you multiple times now how to configure your ports.. you need to set 100 as native vlans on those ports.

                            I even linked to the cisco docs that show you how to set it as native.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                            1 Reply Last reply Reply Quote 0
                            15 out of 18
                            • First post
                              15/18
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.