Hi Kurtis, First, I know floating devices were not developed in a VoIP context so don't be surprised if your Voice VLAN or maximum 2 statements disappear from your port config after a floating device passed.
> > <Here is the log. It appears that the problem first of all was that > I did not have any 'tagged vlans' defined because I don't want to tag any > traffic from this device.> > Earlier you mentioned that you wanted a trunk interface configured. This implies that you are going to tag. However, you probably expected that we would allow all VLANs but we do not. If its a problem for you we can look into it. > <So I added VLAN 200 as a tagged vlan, reset the port config and tried again > and tried again.> > > Feb 03 09:13:28 pfsetvlan(17) INFO: secureMacAddrViolation trap received on > 192.168.10.228 ifIndex 10015 for ac:67:06:15:30:30 (main::handleTrap) > Feb 03 09:13:28 pfsetvlan(17) INFO: The floating network device > ac:67:06:15:30:30 has just plugged into 192.168.10.228 port 10015. Enabling > floating network device configuration on the port. (main::handleTrap) > Feb 03 09:13:28 pfsetvlan(17) INFO: Disabling port-security on port 10015 > (pf::floatingdevice::enablePortConfig) > Feb 03 09:13:28 pfsetvlan(17) DEBUG: opening SNMP v2c write connection to > 192.168.10.228 (pf::SNMP::connectWrite) > Feb 03 09:13:28 pfsetvlan(17) INFO: Setting port 10015 as trunk. > (pf::SNMP::Cisco::Catalyst_2950::enablePortConfigAsTrunk) > Feb 03 09:13:28 pfsetvlan(17) ERROR: An error occured while enabling port > 10015 as multi-vlan (trunk) > (pf::SNMP::Cisco::Catalyst_2950::enablePortConfigAsTrunk) > Feb 03 09:13:28 pfsetvlan(17) INFO: An error occured while enabling floating > network device configuration on port 10015. It may not work! > (main::handleTrap) > Feb 03 09:13:28 pfsetvlan(17) INFO: finished (main::cleanupAfterThread) > Feb 03 09:13:28 pfsetvlan(17) DEBUG: closing SNMP v2c read connection to > 192.168.10.228 (pf::SNMP::disconnectRead) > Feb 03 09:13:28 pfsetvlan(17) DEBUG: closing SNMP v2c write connection to > 192.168.10.228 (pf::SNMP::disconnectWrite) > Feb 03 09:13:28 pfsetvlan(18) INFO: nb of items in queue: 1; nb of threads > running: 0 (main::startTrapHandlers) > Feb 03 09:13:28 pfsetvlan(18) DEBUG: opening SNMP v2c read connection to > 192.168.10.228 (pf::SNMP::connectRead) > Feb 03 09:13:28 pfsetvlan(18) INFO: secureMacAddrViolation trap received on > 192.168.10.228 ifIndex 10015 for ac:67:06:15:30:30 (main::handleTrap) > Feb 03 09:13:28 pfsetvlan(18) INFO: The floating network device > ac:67:06:15:30:30 has just plugged into 192.168.10.228 port 10015. Enabling > floating network device configuration on the port. (main::handleTrap) > Feb 03 09:13:28 pfsetvlan(18) INFO: Disabling port-security on port 10015 > (pf::floatingdevice::enablePortConfig) > Feb 03 09:13:28 pfsetvlan(18) DEBUG: opening SNMP v2c write connection to > 192.168.10.228 (pf::SNMP::connectWrite) > Feb 03 09:13:28 pfsetvlan(18) INFO: Setting port 10015 as trunk. > (pf::SNMP::Cisco::Catalyst_2950::enablePortConfigAsTrunk) > Feb 03 09:13:28 pfsetvlan(18) ERROR: An error occured while enabling port > 10015 as multi-vlan (trunk) > (pf::SNMP::Cisco::Catalyst_2950::enablePortConfigAsTrunk) > Feb 03 09:13:28 pfsetvlan(18) INFO: An error occured while enabling floating > network device configuration on port 10015. It may not work! > (main::handleTrap) > Feb 03 09:13:28 pfsetvlan(18) INFO: finished (main::cleanupAfterThread) > Feb 03 09:13:28 pfsetvlan(18) DEBUG: closing SNMP v2c read connection to > 192.168.10.228 (pf::SNMP::disconnectRead) > Feb 03 09:13:28 pfsetvlan(18) DEBUG: closing SNMP v2c write connection to > 192.168.10.228 (pf::SNMP::disconnectWrite) > Thanks for the output! Now can you try running: snmpwalk -v 2c -c <your read community string> 192.168.10.228 1.3.6.1.4.1.9.9.46.1.6.1.1.13 (all on one line) and show me what you get. You need the net-snmp-utils package installed. Thanks! -- Olivier Bilodeau [email protected] :: +1.514.447.4918 *115 :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ The modern datacenter depends on network connectivity to access resources and provide services. The best practices for maximizing a physical server's connectivity to a physical network are well understood - see how these rules translate into the virtual world? http://p.sf.net/sfu/oracle-sfdevnlfb _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
