[pfSense Support] VLAN trunking?

2006-11-08 Thread Nathan Osborne
Hi everyone,I have a pretty basic VLAN question that I haven't been able to find the answer to:  Can pfSense do VLAN trunking?  More specifically:  I'm installing a Metro Ethernet connection with pfSense boxes on each end.  I need to tag all traffic sent over the Metro Ethernet connection with a specific VLAN id in order for the ISP's switch to handle the traffic correctly and send it on to the pfSense box on the other end.  Can pfSense do this through its VLAN configuration, or would I need a 
802.1q switch in between the pfSense and the Metro E connection on each end to specify the VLAN info?  Each box has Intel cards (em), running ver 1.0.1.Thanks for any tips,Nate 



Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread SDamron

I could be wrong, but don't think I am...You need a switch (802.1Q) in
between the pfsense boxen.

On 11/8/06, Nathan Osborne <[EMAIL PROTECTED]> wrote:

Hi everyone,

I have a pretty basic VLAN question that I haven't been able to find the
answer to:  Can pfSense do VLAN trunking?  More specifically:  I'm
installing a Metro Ethernet connection with pfSense boxes on each end.  I
need to tag all traffic sent over the Metro Ethernet connection with a
specific VLAN id in order for the ISP's switch to handle the traffic
correctly and send it on to the pfSense box on the other end.  Can pfSense
do this through its VLAN configuration, or would I need a 802.1q switch in
between the pfSense and the Metro E connection on each end to specify the
VLAN info?

Each box has Intel cards (em), running ver 1.0.1.

Thanks for any tips,
Nate




--
---
Every revolution begins with the power of an idea and ends when the
only idea left is power.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Traffic shaping with or without ALTQ

2006-11-08 Thread Christian Krützfeldt
Hi,

As the recent discussion in the forum shows, there is interest in a new traffic 
shaper.

>From the discussion I can see that everybody wants something different from 
>the traffic shaper. :-)

Wishes include:
- transparent traffic shaping
- QOS
- shaping on all interfaces
- shaping traffic inside individual IPSEC tunnels
- routing traffic based on traffic queue status
- port and IP based shaping
- easy to use and administrate
- everything possible on a large scale OC12 with hundreds of servers

To make all this possible, I guess we need some sort of virtual interfaces.
If we have an easy way to create a virtual interface, we could combine the 
traffic we want to shape on an virtual interface and then use a shaper like 
ALTQ without the need to reprogramm everything.
Just create an virtual interface for IPSEC tunnel X, give it a name like 
(WAN_IPSEC_HQ) and shape on that interface.

As for the large scale, it is not practical to add hundreds of rules and 
shaping entries for each source IP. Virtual Interfaces could also help here. If 
you can create virtual interfaces based on source IP and apply the same traffic 
shaping rules to a group of interfaces it would only be a couple of mouse 
clicks.
Pfsense could automatically create an virtual interface when traffic comes in 
from a new source and X seconds after the last traffic from that source delete 
the virtual interface again.
 

I guess nobody is suggesting shaping a couple of OC12 lines on a small embedded 
system with 128 MB of RAM and an slow CPU, but on the other hand for people who 
only have a 2 Mbit DSL line it should still be possible to run the same code. 
So please whatever you do, don't increase the minimum requirements too much.


Unfortunately I'm not good enough at programming such things, so I wouldn't 
have a clue on how to do it. :( But I'm willing to put in a bounty for it.

Any thougts about this?

Christian

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Traffic shaping with or without ALTQ

2006-11-08 Thread Scott Ullrich

What are you talking about?   We are merely raising money for a
transparent bridge shaper.  Please cut this FUD out.

Scott


On 11/8/06, Christian Krützfeldt <[EMAIL PROTECTED]> wrote:

Hi,

As the recent discussion in the forum shows, there is interest in a new traffic 
shaper.

From the discussion I can see that everybody wants something different from the 
traffic shaper. :-)

Wishes include:
- transparent traffic shaping
- QOS
- shaping on all interfaces
- shaping traffic inside individual IPSEC tunnels
- routing traffic based on traffic queue status
- port and IP based shaping
- easy to use and administrate
- everything possible on a large scale OC12 with hundreds of servers

To make all this possible, I guess we need some sort of virtual interfaces.
If we have an easy way to create a virtual interface, we could combine the 
traffic we want to shape on an virtual interface and then use a shaper like 
ALTQ without the need to reprogramm everything.
Just create an virtual interface for IPSEC tunnel X, give it a name like 
(WAN_IPSEC_HQ) and shape on that interface.

As for the large scale, it is not practical to add hundreds of rules and 
shaping entries for each source IP. Virtual Interfaces could also help here. If 
you can create virtual interfaces based on source IP and apply the same traffic 
shaping rules to a group of interfaces it would only be a couple of mouse 
clicks.
Pfsense could automatically create an virtual interface when traffic comes in 
from a new source and X seconds after the last traffic from that source delete 
the virtual interface again.


I guess nobody is suggesting shaping a couple of OC12 lines on a small embedded 
system with 128 MB of RAM and an slow CPU, but on the other hand for people who 
only have a 2 Mbit DSL line it should still be possible to run the same code. 
So please whatever you do, don't increase the minimum requirements too much.


Unfortunately I'm not good enough at programming such things, so I wouldn't 
have a clue on how to do it. :( But I'm willing to put in a bounty for it.

Any thougts about this?

Christian

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Traffic shaping with or without ALTQ

2006-11-08 Thread Bill Marquette

I haven't yet chimed in too much on this thread.  When I do, I'll
probably close the thread and start a new one that I can update the
first message in with what I'm planning on doing and what's impossible
and who has made pledges against the bounty.

For the record, the bounty was started for transparent shaping - given
that some fundamentals on how we do shaping have to change, some of
the other wish list items might creep in (multi-interface shaping),
but I need to think about what I think we can and cannot do.

I will comment on a couple of the wishlist items that are certainly
off the table.

This:

- shaping traffic inside individual IPSEC tunnels

Is an impossible wish list item - doesn't matter how much money anyone
comes up with, it requires major kernel land work and I'm reasonably
confident I don't have the skill to make the changes that would be
required.  Maybe the person that brought in enc(4) to FreeBSD could be
convinced to make it behave more like a regular interface...that'd go
a LONG way towards making this a reality.

This:

- routing traffic based on traffic queue status

Is also unlikely to happen, but at least might be somewhat doable in the future.

--Bill

On 11/8/06, Christian Krützfeldt <[EMAIL PROTECTED]> wrote:

Hi,

As the recent discussion in the forum shows, there is interest in a new traffic 
shaper.

From the discussion I can see that everybody wants something different from the 
traffic shaper. :-)

Wishes include:
- transparent traffic shaping
- QOS
- shaping on all interfaces
- shaping traffic inside individual IPSEC tunnels
- routing traffic based on traffic queue status
- port and IP based shaping
- easy to use and administrate
- everything possible on a large scale OC12 with hundreds of servers

To make all this possible, I guess we need some sort of virtual interfaces.
If we have an easy way to create a virtual interface, we could combine the 
traffic we want to shape on an virtual interface and then use a shaper like 
ALTQ without the need to reprogramm everything.
Just create an virtual interface for IPSEC tunnel X, give it a name like 
(WAN_IPSEC_HQ) and shape on that interface.

As for the large scale, it is not practical to add hundreds of rules and 
shaping entries for each source IP. Virtual Interfaces could also help here. If 
you can create virtual interfaces based on source IP and apply the same traffic 
shaping rules to a group of interfaces it would only be a couple of mouse 
clicks.
Pfsense could automatically create an virtual interface when traffic comes in 
from a new source and X seconds after the last traffic from that source delete 
the virtual interface again.


I guess nobody is suggesting shaping a couple of OC12 lines on a small embedded 
system with 128 MB of RAM and an slow CPU, but on the other hand for people who 
only have a 2 Mbit DSL line it should still be possible to run the same code. 
So please whatever you do, don't increase the minimum requirements too much.


Unfortunately I'm not good enough at programming such things, so I wouldn't 
have a clue on how to do it. :( But I'm willing to put in a bounty for it.

Any thougts about this?

Christian

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread John Cianfarani








pfSense does do 802.1q trunking so if they
device you are connecting does (should be most except some older switches) you
shouldn’t have a problem.

 

Thanks

John

 









From: Nathan Osborne
[mailto:[EMAIL PROTECTED] 
Sent: Wednesday, November 08, 2006
9:19 AM
To: support@pfsense.com
Subject: [pfSense Support] VLAN
trunking?



 

Hi everyone,

I have a pretty basic VLAN question that I haven't been able to find the answer
to:  Can pfSense do VLAN trunking?  More specifically:  I'm
installing a Metro Ethernet connection with pfSense boxes on each end.  I
need to tag all traffic sent over the Metro Ethernet connection with a specific
VLAN id in order for the ISP's switch to handle the traffic correctly and send
it on to the pfSense box on the other end.  Can pfSense do this through
its VLAN configuration, or would I need a 802.1q switch in between the pfSense
and the Metro E connection on each end to specify the VLAN info?  

Each box has Intel cards (em), running ver 1.0.1.

Thanks for any tips,
Nate








Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Bill Marquette

On 11/8/06, Nathan Osborne <[EMAIL PROTECTED]> wrote:

Hi everyone,

I have a pretty basic VLAN question that I haven't been able to find the
answer to:  Can pfSense do VLAN trunking?  More specifically:  I'm
installing a Metro Ethernet connection with pfSense boxes on each end.  I
need to tag all traffic sent over the Metro Ethernet connection with a
specific VLAN id in order for the ISP's switch to handle the traffic
correctly and send it on to the pfSense box on the other end.  Can pfSense
do this through its VLAN configuration, or would I need a 802.1q switch in
between the pfSense and the Metro E connection on each end to specify the
VLAN info?

Each box has Intel cards (em), running ver 1.0.1.


Should be possible.  The VLAN setup assumes trunk mode.

--Bill

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread Craig FALCONER
Should work - I've been playing with vlans and got it all working.

The only weirdness I have left to solve is why my vlan only works if there's
a 
tcpdump -i vlan0 > /dev/null &
running on my pfsense box.  If thats not running I simply see no data.  


-Original Message-
From: Nathan Osborne [mailto:[EMAIL PROTECTED] 
Sent: Thursday, 9 November 2006 3:19 a.m.
To: support@pfsense.com
Subject: [pfSense Support] VLAN trunking?


Hi everyone,

I have a pretty basic VLAN question that I haven't been able to find the
answer to:  Can pfSense do VLAN trunking?  More specifically:  I'm
installing a Metro Ethernet connection with pfSense boxes on each end.  I
need to tag all traffic sent over the Metro Ethernet connection with a
specific VLAN id in order for the ISP's switch to handle the traffic
correctly and send it on to the pfSense box on the other end.  Can pfSense
do this through its VLAN configuration, or would I need a 802.1q switch in
between the pfSense and the Metro E connection on each end to specify the
VLAN info?  

Each box has Intel cards (em), running ver 1.0.1.

Thanks for any tips,
Nate


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Scott Ullrich

On 11/8/06, Craig FALCONER <[EMAIL PROTECTED]> wrote:

Should work - I've been playing with vlans and got it all working.

The only weirdness I have left to solve is why my vlan only works if there's
a
tcpdump -i vlan0 > /dev/null &
running on my pfsense box.  If thats not running I simply see no data.


What kind of NIC(s)?

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread Craig FALCONER
From: Scott Ullrich [mailto:[EMAIL PROTECTED] 
>On 11/8/06, Craig FALCONER <[EMAIL PROTECTED]> wrote:
>> Should work - I've been playing with vlans and got it all working.
>>
>> The only weirdness I have left to solve is why my vlan only works if 
>> there's a tcpdump -i vlan0 > /dev/null &
>> running on my pfsense box.  If thats not running I simply see no data.

> What kind of NIC(s)?

Intel somethingorother... It's a nokia IP330

dmesg says
fxp2:  port 0x7000-0x701f mem
0xe0301000-0xe0301fff,0xe020-0xe02f irq 5 at device 15.0 on pci0


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Scott Ullrich

On 11/8/06, Craig FALCONER <[EMAIL PROTECTED]> wrote:

From: Scott Ullrich [mailto:[EMAIL PROTECTED]
>On 11/8/06, Craig FALCONER <[EMAIL PROTECTED]> wrote:
>> Should work - I've been playing with vlans and got it all working.
>>
>> The only weirdness I have left to solve is why my vlan only works if
>> there's a tcpdump -i vlan0 > /dev/null &
>> running on my pfsense box.  If thats not running I simply see no data.

> What kind of NIC(s)?

Intel somethingorother... It's a nokia IP330


Doesn't really make any sense.  We already are doing a background
TCPDUMP to get the firewall logs.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Bill Marquette

On 11/8/06, Scott Ullrich <[EMAIL PROTECTED]> wrote:

On 11/8/06, Craig FALCONER <[EMAIL PROTECTED]> wrote:
> From: Scott Ullrich [mailto:[EMAIL PROTECTED]
> >On 11/8/06, Craig FALCONER <[EMAIL PROTECTED]> wrote:
> >> Should work - I've been playing with vlans and got it all working.
> >>
> >> The only weirdness I have left to solve is why my vlan only works if
> >> there's a tcpdump -i vlan0 > /dev/null &
> >> running on my pfsense box.  If thats not running I simply see no data.
>
> > What kind of NIC(s)?
>
> Intel somethingorother... It's a nokia IP330

Doesn't really make any sense.  We already are doing a background
TCPDUMP to get the firewall logs.


On pflog0.  This is on the vlan interface which really is bizarre.  I
could see if for some reason the physical fxp interface wasn't in
PROMISC mode needing to do it for that interface, but for the vlan
interface I'm stumped.

--Bill

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Nathan Osborne
Thanks everyone, it worked.For future reference, here's how:  I created a new VLAN and assigned it to the Metro Ethernet interface.  Then I added the VLAN as a new interface and enabled it, assigning a static IP in a different IP range from the Metro Ethernet interface.  I rebooted next for the system to recognize the new VLAN interface.  Then I added firewall rules to allow traffic through both the Metro interface and the VLAN interface (not sure yet if both of these are necessary), and finally added a static route to send LAN traffic destined for the remote LAN to the IP of the remote VLAN interface. 
It's a pretty short distance and it's a fast pipe, so I should be able to get some pretty good benchmarks of the type of traffic it's possible to push over this connection.  I'm running it on Poweredge 1850 servers with 2 GB RAM, onboard Intel NICs, and Intel 1000MT dual port server PCI adapters.
NateOn 11/8/06, Bill Marquette <


[EMAIL PROTECTED]> wrote:
On 11/8/06, Nathan Osborne <[EMAIL PROTECTED]> wrote:> Hi everyone,>> I have a pretty basic VLAN question that I haven't been able to find the
> answer to:  Can pfSense do VLAN trunking?  More specifically:  I'm
> installing a Metro Ethernet connection with pfSense boxes on each end.  I> need to tag all traffic sent over the Metro Ethernet connection with a> specific VLAN id in order for the ISP's switch to handle the traffic
> correctly and send it on to the pfSense box on the other end.  Can pfSense> do this through its VLAN configuration, or would I need a 802.1q switch in> between the pfSense and the Metro E connection on each end to specify the
> VLAN info?>> Each box has Intel cards (em), running ver 1.0.1.Should be possible.  The VLAN setup assumes trunk mode.--Bill-
To unsubscribe, e-mail: [EMAIL PROTECTED]For additional commands, e-mail: 
[EMAIL PROTECTED]






RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread Craig FALCONER
Title: Message



So you 
have a two-way metrosexual connection?

  
  -Original Message-From: Nathan Osborne 
  [mailto:[EMAIL PROTECTED] Sent: Thursday, 9 November 2006 9:39 
  a.m.To: support@pfsense.comSubject: Re: [pfSense 
  Support] VLAN trunking?It's a pretty short distance and 
  it's a fast pipe, so I should be able to get some pretty good benchmarks of 
  the type of traffic it's possible to push over this connection.  I'm 
  running it on Poweredge 1850 servers with 2 GB RAM, onboard Intel NICs, and 
  Intel 1000MT dual port server PCI adapters. 


Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Chris Buechler

Bill Marquette wrote:


Doesn't really make any sense.  We already are doing a background
TCPDUMP to get the firewall logs.


On pflog0.  This is on the vlan interface which really is bizarre.  I
could see if for some reason the physical fxp interface wasn't in
PROMISC mode needing to do it for that interface, but for the vlan
interface I'm stumped.


And he said that's the only way it *works*?  Due to the FreeBSD + 
promisc bug with VLAN's, tcpdumping any vlanX interface or the parent 
interface should kill all network activity on all VLAN's.  Does on every 
box I've tried, and others have reported the same. 





-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread Craig FALCONER
Heya - not wishing to argue, but I'm really telling the truth.

vlan0 is 192.168.200.1/24 and the workstation is at 192.168.200.2

# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=4.221 ms
64 bytes from 192.168.200.2: icmp_seq=1 ttl=64 time=1.233 ms
^C
--- 192.168.200.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.233/2.727/4.221/1.494 ms
# ps auxw | grep tcpdump
root 298  0.0  0.9  3832  2172  d0- SSat07PM   0:51.74
/usr/sbin/tcpdump -l -n -e -ttt -i pflog0
root   48512  0.0  0.2  1468   608  p0  R+2:15PM   0:00.01 grep tcpdump
root   67821  0.0  0.9  3852  2244  p0- S 9:12PM   0:17.03 tcpdump -i
vlan0
# kill 67821
# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
^C
--- 192.168.200.2 ping statistics ---
4 packets transmitted, 0 packets received, 100% packet loss
# tcpdump -i vlan0 > /dev/null &
[1] 48592
# tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vlan0, link-type EN10MB (Ethernet), capture size 96 bytes
# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=2.412 ms
64 bytes from 192.168.200.2: icmp_seq=1 ttl=64 time=1.009 ms
^C
--- 192.168.200.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.009/1.710/2.412/0.701 ms
#


All I can think of is more Nokia weirdness.  This is an IP330 with three
on-board NICs.


-Original Message-
From: Chris Buechler [mailto:[EMAIL PROTECTED] 

Bill Marquette wrote:
>>
>> Doesn't really make any sense.  We already are doing a background 
>> TCPDUMP to get the firewall logs.
>
> On pflog0.  This is on the vlan interface which really is bizarre.  I 
> could see if for some reason the physical fxp interface wasn't in 
> PROMISC mode needing to do it for that interface, but for the vlan 
> interface I'm stumped.

And he said that's the only way it *works*?  Due to the FreeBSD + 
promisc bug with VLAN's, tcpdumping any vlanX interface or the parent 
interface should kill all network activity on all VLAN's.  Does on every 
box I've tried, and others have reported the same. 


 

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Chris Buechler

Craig FALCONER wrote:

Heya - not wishing to argue, but I'm really telling the truth.
  


Oh, hey Craig, didn't realize it was you that started this.  :) 


All I can think of is more Nokia weirdness.  This is an IP330 with three
on-board NICs.
  


The IPxxx boxes certainly do have "special" NIC's.  I personally haven't 
tried VLAN's on fxp cards, but I seem to recall others having the same 
issue I described with some Intel cards.  /me shrugs...




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread Charles Sprickman

On Thu, 9 Nov 2006, Craig FALCONER wrote:


Heya - not wishing to argue, but I'm really telling the truth.


Here's kind of an out of left field idea...

Someone mentioned that running tcpdump on a vlan interface actually 
*breaks* it.  By "breaks", I'm betting that means "sends the vlan traffic 
without vlan tags".


If that is indeed the case, perhaps your metro ether provider does not 
allow tagged ethernet packets.


Make sense?

Charles


vlan0 is 192.168.200.1/24 and the workstation is at 192.168.200.2

# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=4.221 ms
64 bytes from 192.168.200.2: icmp_seq=1 ttl=64 time=1.233 ms
^C
--- 192.168.200.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.233/2.727/4.221/1.494 ms
# ps auxw | grep tcpdump
root 298  0.0  0.9  3832  2172  d0- SSat07PM   0:51.74
/usr/sbin/tcpdump -l -n -e -ttt -i pflog0
root   48512  0.0  0.2  1468   608  p0  R+2:15PM   0:00.01 grep tcpdump
root   67821  0.0  0.9  3852  2244  p0- S 9:12PM   0:17.03 tcpdump -i
vlan0
# kill 67821
# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
^C
--- 192.168.200.2 ping statistics ---
4 packets transmitted, 0 packets received, 100% packet loss
# tcpdump -i vlan0 > /dev/null &
[1] 48592
# tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vlan0, link-type EN10MB (Ethernet), capture size 96 bytes
# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=2.412 ms
64 bytes from 192.168.200.2: icmp_seq=1 ttl=64 time=1.009 ms
^C
--- 192.168.200.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.009/1.710/2.412/0.701 ms
#


All I can think of is more Nokia weirdness.  This is an IP330 with three
on-board NICs.


-Original Message-
From: Chris Buechler [mailto:[EMAIL PROTECTED]

Bill Marquette wrote:


Doesn't really make any sense.  We already are doing a background
TCPDUMP to get the firewall logs.


On pflog0.  This is on the vlan interface which really is bizarre.  I
could see if for some reason the physical fxp interface wasn't in
PROMISC mode needing to do it for that interface, but for the vlan
interface I'm stumped.


And he said that's the only way it *works*?  Due to the FreeBSD +
promisc bug with VLAN's, tcpdumping any vlanX interface or the parent
interface should kill all network activity on all VLAN's.  Does on every
box I've tried, and others have reported the same.




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VLAN trunking?

2006-11-08 Thread Chris Buechler

Charles Sprickman wrote:

Here's kind of an out of left field idea...

Someone mentioned that running tcpdump on a vlan interface actually 
*breaks* it.  By "breaks", I'm betting that means "sends the vlan 
traffic without vlan tags".


I'm not sure exactly what happens to break it, but sending the traffic 
without tags would make sense.  I haven't done enough testing to know 
what happens to the traffic. 

Interesting theory, could very well be right on. 



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread Craig FALCONER
Sorry I'm not the metro guy.

I have a pfsense box plugged into a non-managed switch, so the vlan MTU had
to be dropped to 1496.  The pfsense box only sees traffic on the vlan when
there's a tcpdump session running.

On the other box I had to disable rp_filter before the vlan tagging worked.
I haven't found the same thing in freeBSD.

This is what rp_filter does in linux.
546 rp_filter - BOOLEAN
547 1 - do source validation by reversed path, as specified in RFC1812
548 Recommended option for single homed hosts and stub network
549 routers. Could cause troubles for complicated (not loop
free)
550 networks running a slow unreliable protocol (sort of RIP),
551 or using static routes.
552 
553 0 - No source validation.
554 
555 conf/all/rp_filter must also be set to TRUE to do source validation
556 on the interface
557 
558 Default value is 0. Note that most distributions enable it in startup
scripts.

I imagine the same concept is hidden somewhere in sysctl but I can't spot
it.
These are possibilities...
net.inet.ip.check_interface: 0
net.inet.ip.sourceroute: 0
net.inet.ip.redirect: 0

Or do I just "ifconfig vlan0 mtu 1496 promisc"  ?




-Original Message-
From: Charles Sprickman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, 9 November 2006 2:32 p.m.
To: support@pfsense.com
Subject: RE: [pfSense Support] VLAN trunking?


On Thu, 9 Nov 2006, Craig FALCONER wrote:

> Heya - not wishing to argue, but I'm really telling the truth.

Here's kind of an out of left field idea...

Someone mentioned that running tcpdump on a vlan interface actually 
*breaks* it.  By "breaks", I'm betting that means "sends the vlan traffic 
without vlan tags".

If that is indeed the case, perhaps your metro ether provider does not 
allow tagged ethernet packets.

Make sense?

Charles

> vlan0 is 192.168.200.1/24 and the workstation is at 192.168.200.2
>
> # ping 192.168.200.2
> PING 192.168.200.2 (192.168.200.2): 56 data bytes
> 64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=4.221 ms 64 bytes 
> from 192.168.200.2: icmp_seq=1 ttl=64 time=1.233 ms ^C
> --- 192.168.200.2 ping statistics ---
> 2 packets transmitted, 2 packets received, 0% packet loss
> round-trip min/avg/max/stddev = 1.233/2.727/4.221/1.494 ms
> # ps auxw | grep tcpdump
> root 298  0.0  0.9  3832  2172  d0- SSat07PM   0:51.74
> /usr/sbin/tcpdump -l -n -e -ttt -i pflog0
> root   48512  0.0  0.2  1468   608  p0  R+2:15PM   0:00.01 grep
tcpdump
> root   67821  0.0  0.9  3852  2244  p0- S 9:12PM   0:17.03 tcpdump -i
> vlan0
> # kill 67821
> # ping 192.168.200.2
> PING 192.168.200.2 (192.168.200.2): 56 data bytes
> ^C
> --- 192.168.200.2 ping statistics ---
> 4 packets transmitted, 0 packets received, 100% packet loss
> # tcpdump -i vlan0 > /dev/null &
> [1] 48592
> # tcpdump: verbose output suppressed, use -v or -vv for full protocol
decode
> listening on vlan0, link-type EN10MB (Ethernet), capture size 96 bytes
> # ping 192.168.200.2
> PING 192.168.200.2 (192.168.200.2): 56 data bytes
> 64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=2.412 ms
> 64 bytes from 192.168.200.2: icmp_seq=1 ttl=64 time=1.009 ms
> ^C
> --- 192.168.200.2 ping statistics ---
> 2 packets transmitted, 2 packets received, 0% packet loss
> round-trip min/avg/max/stddev = 1.009/1.710/2.412/0.701 ms
> #
>
>
> All I can think of is more Nokia weirdness.  This is an IP330 with 
> three on-board NICs.
>
>
> -Original Message-
> From: Chris Buechler [mailto:[EMAIL PROTECTED]
>
> Bill Marquette wrote:
>>>
>>> Doesn't really make any sense.  We already are doing a background 
>>> TCPDUMP to get the firewall logs.
>>
>> On pflog0.  This is on the vlan interface which really is bizarre.  I 
>> could see if for some reason the physical fxp interface wasn't in 
>> PROMISC mode needing to do it for that interface, but for the vlan 
>> interface I'm stumped.
>
> And he said that's the only way it *works*?  Due to the FreeBSD + 
> promisc bug with VLAN's, tcpdumping any vlanX interface or the parent 
> interface should kill all network activity on all VLAN's.  Does on 
> every box I've tried, and others have reported the same.
>
>
>
>
> -
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>
>
> -
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking?

2006-11-08 Thread Craig FALCONER
I suspect this is not the answer.  I ran tcpdump net 192.168.200.0/24 on a
third machine and there's no traffic detected.  I'm using a dumb unmanaged
switch which makes it more confusing.



-Original Message-
From: Chris Buechler [mailto:[EMAIL PROTECTED] 
Sent: Thursday, 9 November 2006 3:01 p.m.
To: support@pfsense.com
Subject: Re: [pfSense Support] VLAN trunking?


Charles Sprickman wrote:
> Here's kind of an out of left field idea...
>
> Someone mentioned that running tcpdump on a vlan interface actually
> *breaks* it.  By "breaks", I'm betting that means "sends the vlan 
> traffic without vlan tags".

I'm not sure exactly what happens to break it, but sending the traffic 
without tags would make sense.  I haven't done enough testing to know 
what happens to the traffic. 

Interesting theory, could very well be right on. 


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] VLAN trunking? SOLVED

2006-11-08 Thread Craig FALCONER
It *IS* promiscuous mode that's making it work.


With tcpdump running in the background
# ifconfig vlan0
vlan0: flags=8943 mtu 1500
inet 192.168.200.1 netmask 0xff00 broadcast 192.168.200.255
inet6 fe80::2a0:8eff:fef6:6ae8%vlan0 prefixlen 64 scopeid 0x8 
ether 00:12:92:33:46:aa
media: Ethernet autoselect (100baseTX )
status: active
vlan: 4 parent interface: fxp0
# ifconfig fxp0
fxp0: flags=8943 mtu 1500
options=8
inet6 fe80::2004:77a:c5f6:4af5%fxp0 prefixlen 64 scopeid 0x1 
inet 10.28.1.1 netmask 0x broadcast 10.28.255.255
ether 02:a5:53:e0:c4:67
media: Ethernet autoselect (100baseTX )
status: active



After killing tcpdump
# ifconfig vlan0
vlan0: flags=8843 mtu 1500
inet 192.168.200.1 netmask 0xff00 broadcast 192.168.200.255
inet6 fe80::2a0:8eff:fef6:6ae8%vlan0 prefixlen 64 scopeid 0x8 
ether 00:12:92:33:46:aa
media: Ethernet autoselect (100baseTX )
status: active
vlan: 4 parent interface: fxp0
# ifconfig fxp0
fxp0: flags=8843 mtu 1500
options=8
inet6 fe80::2004:77a:c5f6:4af5%fxp0 prefixlen 64 scopeid 0x1 
inet 10.28.1.1 netmask 0x broadcast 10.28.255.255
ether 02:a5:53:e0:c4:67
media: Ethernet autoselect (100baseTX )
status: active

# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
^C
--- 192.168.200.2 ping statistics ---
2 packets transmitted, 0 packets received, 100% packet loss

# ifconfig vlan0 promisc
# ping 192.168.200.2
PING 192.168.200.2 (192.168.200.2): 56 data bytes
64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=1.360 ms
64 bytes from 192.168.200.2: icmp_seq=1 ttl=64 time=1.138 ms
^C
--- 192.168.200.2 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max/stddev = 1.138/1.249/1.360/0.111 ms
# 


So it looks like my VLAN setup required promisc mode on fxp0 (my lan port)
and vlan0
What do you think?




-Original Message-
From: Craig FALCONER [mailto:[EMAIL PROTECTED] 
Sent: Thursday, 9 November 2006 3:09 p.m.
To: support@pfsense.com
Subject: RE: [pfSense Support] VLAN trunking?


Sorry I'm not the metro guy.

I have a pfsense box plugged into a non-managed switch, so the vlan MTU had
to be dropped to 1496.  The pfsense box only sees traffic on the vlan when
there's a tcpdump session running.

On the other box I had to disable rp_filter before the vlan tagging worked.
I haven't found the same thing in freeBSD.

This is what rp_filter does in linux.
546 rp_filter - BOOLEAN
547 1 - do source validation by reversed path, as specified in RFC1812
548 Recommended option for single homed hosts and stub network
549 routers. Could cause troubles for complicated (not loop
free)
550 networks running a slow unreliable protocol (sort of RIP),
551 or using static routes.
552 
553 0 - No source validation.
554 
555 conf/all/rp_filter must also be set to TRUE to do source validation
556 on the interface
557 
558 Default value is 0. Note that most distributions enable it in startup
scripts.

I imagine the same concept is hidden somewhere in sysctl but I can't spot
it.
These are possibilities...
net.inet.ip.check_interface: 0
net.inet.ip.sourceroute: 0
net.inet.ip.redirect: 0

Or do I just "ifconfig vlan0 mtu 1496 promisc"  ?




-Original Message-
From: Charles Sprickman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, 9 November 2006 2:32 p.m.
To: support@pfsense.com
Subject: RE: [pfSense Support] VLAN trunking?


On Thu, 9 Nov 2006, Craig FALCONER wrote:

> Heya - not wishing to argue, but I'm really telling the truth.

Here's kind of an out of left field idea...

Someone mentioned that running tcpdump on a vlan interface actually 
*breaks* it.  By "breaks", I'm betting that means "sends the vlan traffic 
without vlan tags".

If that is indeed the case, perhaps your metro ether provider does not 
allow tagged ethernet packets.

Make sense?

Charles

> vlan0 is 192.168.200.1/24 and the workstation is at 192.168.200.2
>
> # ping 192.168.200.2
> PING 192.168.200.2 (192.168.200.2): 56 data bytes
> 64 bytes from 192.168.200.2: icmp_seq=0 ttl=64 time=4.221 ms 64 bytes 
> from 192.168.200.2: icmp_seq=1 ttl=64 time=1.233 ms ^C
> --- 192.168.200.2 ping statistics ---
> 2 packets transmitted, 2 packets received, 0% packet loss
> round-trip min/avg/max/stddev = 1.233/2.727/4.221/1.494 ms
> # ps auxw | grep tcpdump
> root 298  0.0  0.9  3832  2172  d0- SSat07PM   0:51.74
> /usr/sbin/tcpdump -l -n -e -ttt -i pflog0
> root   48512  0.0  0.2  1468   608  p0  R+2:15PM   0:00.01 grep
tcpdump
> root   67821  0.0  0.9  3852  2244  p0- S 9:12PM   0:17.03 tcpdump -i
> vlan0
> # kill 67821
> # ping 192.168.200.2
> PING 192.168.200.2 (192.168.200.2): 56 data bytes
> ^C
> --- 192.168.200.2 ping statistics ---
> 4 packets transmitted, 0 packets received, 100% packet loss
> # tcp