• HELP, creating 2nd BGP for Cloud direct connect

    1
    0 Votes
    1 Posts
    199 Views
    No one has replied
  • Websites / Public IP of BGP Neighbor not reachable when FRR turned on

    1
    0 Votes
    1 Posts
    206 Views
    No one has replied
  • BGP route-map aigp

    1
    0 Votes
    1 Posts
    453 Views
    No one has replied
  • Does BFD Use CPU?

    3
    0 Votes
    3 Posts
    1k Views
    D

    @wblanton FRR does not currently by default do any asic offload of BFD. 50 BFD peers should be ok on modern cpu's I would think though

  • Publish 2 Identical Routes with Different Metric

    4
    0 Votes
    4 Posts
    577 Views
    M

    @jamiegb said in Publish 2 Identical Routes with Different Metric:

    te twice but with a different metric so my peer will pre

    Its common to adjust either local-pref or as-path prepend attributes. In your case, if you want your peer to use one path for a destination vs another then as-path prepend that route out a few times[using your local-as of course].

  • 0 Votes
    3 Posts
    831 Views
    M

    @rebelboy1988 I would remove the route-map from the neighbor command so you have no filter applied and then see if you are getting routes. If not then the problem is with the AWS peer.

  • Advertisement via BGP

    Moved
    1
    0 Votes
    1 Posts
    272 Views
    No one has replied
  • FRR package 1.1.1_7 on Pfsense 2.6.0 has got Prefix-lists update issues

    3
    0 Votes
    3 Posts
    593 Views
    DerelictD

    @ersany If you wish to look at the FRR config file when using the GUI to configure it (not raw config), Go to Status > FRR, Configuration.

    As explained above, using the raw configuration disables the GUI config. You have assumed responsibility for the FRR configuration in that case and changes must be made to the raw configuration instead.

  • FRR issues on 2.7snapshots? (figured it out)

    1
    0 Votes
    1 Posts
    253 Views
    No one has replied
  • Problems with FRR

    12
    0 Votes
    12 Posts
    2k Views
    G

    @pete35 I grabbed a Plus lab license and changed a CE 2.6.0 install to 22.5 and saw that FRR is unchanged in that version, and the underlying FRR version is still only 7.5.1 at this point in time. Not sure where Netgate's priorities are here, as solid/dependable routing is absolutely key for corporate customers - the ones most likely to pay for the upper tier support contacts. IMHO FRR should be a top priority. FTIW pfSense CE 2.7.0 is still only on FRRR 7.5.1 but granted that is still early beta, but would be a shame if it too was still only 7.5.1 when final and not on a more recent FRR 8.x release.

  • Found 6 issues with FRR/OSPF in pfSense 2.5.1

    18
    4 Votes
    18 Posts
    4k Views
    G

    Summarising the initial 6 things I raised:

    1. #1. SPF algorithm firing causes OSPF "redistribute connected" routes to flush.
    This was raised in #11835.
    I can see that no one has worked on this critical bug. I have tested and this is still an issue (!!)

    #2. OSPF protocol filtering (FRR GUI - Global Settings / Route Handling) causes FRR to do strange things (and make OSPF routes invalid / crash FRR etc)
    I avoid the "FRR GUI - Global Settings / 'Route Handling'" way of filtering as I found that too unstable so haven't tested it since finding it a problem. I have done filtering elsewhere on my Mikrotik routers instead.

    I did raise 11836 for a related issue, and some things improved there, but not sure if this actual issue is fixed or not. Since I don't use the "route handling" features I stopped looking at this issue.

    #3. ACL's no-longer have an implicit deny at the end.
    I did raise 11841 but I am not looking at this issue as I found that prefix-lists weren't affected so I swapped over from access-lists (ACLs) to prefix lists for my needs (for the redistributing of specific connected routes into OSPF).

    #4. OpenVPN links re-establishing can cause "onlink" routes to become inactive
    @mdomnis How did you end up going with this? I didn't actually raise a ticket for this but you've been working with pfSense on it I see. I'm not seeing it in pfSense 2.6, but my test lab might be different to when I had it last. Solved?

    Issues #5 and #6 - ACCEPTFILTER prefix list entries to be duplicated, and Interface descriptions cumulative
    These got fixed - am not seeing these issues in pfSense 2.6. They would have been pretty trivial to sort out.

    ======
    so in short, #5 and #6 are fixed. #4 seems to be fixed (to be confirmed).. #2 and #3 - I have worked around (have avoided those features, thus I'm not affected).

    The only thing that that I am affected by right now (and cannot avoid) is issue #1. And it's still really bad. Here's one of my connected routes dropping the moment a backup link comes back up:
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 01:07:33
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 01:07:35
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 01:07:37
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 01:07:38
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 01:07:40
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 00:00:01
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 00:00:03
    pfsense01.it.somecompany.com.au# show ip route | include 10.24.1
    O>* 10.24.194.0/24 [110/20] via 10.255.195.2, ovpns2 onlink, weight 1, 00:00:04
    pfsense01.it.somecompany.com.au#

    10.255.195.2 is the far end of the primary link (p2p). The backup p2p link re-establishing should not cause this route learned over the primary link to flush and relearn. I'm testing pfSense 2.6.0-RELEASE which is built on FreeBSD 12.3-STABLE and has FRR version 7.5.1

    update: I cloned my lab and updated pfSense to 2.7.0
    2.7.0-DEVELOPMENT (amd64)
    built on Mon Oct 17 06:04:34 UTC 2022
    FreeBSD 14.0-CURRENT

    It is still happening on there. The FRR on 2.7 is still only 7.5.1. Why so old? https://frrouting.org/release/ That's from March 7 2021. FRR is up to 8.3.1 now - 5 releases on from that. Really would like to see what happens in a later version of FRR and hoping the devs can update the FRR package to the latest release soon.

  • OSPF IPv4 issues when reconfiguring LAN OPT1 interface

    1
    0 Votes
    1 Posts
    504 Views
    No one has replied
  • No route to host even though FRR BGP summary shows route in table.

    3
    0 Votes
    3 Posts
    1k Views
    R

    @wstocker I have a strange issue where I can propagate routes into AWS and see them in Transit Gateway's route table, however I am getting no routes back from Transit Gateway for Propagated VPC attachments.

    Did you use a Virtual IP address or and enable the P2 VTIs as an interface?

  • FRR BGP routes not updated during CARP HA failover

    1
    0 Votes
    1 Posts
    633 Views
    No one has replied
  • FRR OSPF distribute route for OpenVPN Interface

    Moved
    8
    1 Votes
    8 Posts
    4k Views
    B

    @itsdave @srain @nzkiwi68 @awebster
    I managed to redistribute exact openvpn networks without usage of supernets in other way:
    interfaces > assignments > and assigned openvpn interfaces and enabled them in interfaces menu:

    c4974312-a0e8-4d2e-a506-f268071cbe59-image.png

    and added "static route targets" pointing to those previously created (and enabled) openvpn interfaces: services > FRR global/zebra > global settings > route handling

    7efd11ba-f046-4727-b19c-d4840d9339d7-image.png

    hope this will help someone and sorry for reviving a quite old post:)

  • Protocol support: IS-IS

    2
    1 Votes
    2 Posts
    577 Views
    H

    @netravnen afaik pfsense doesn't have a GUI to configure ISIS - but i see that the isisd executable is present on the filesystem. you could try to craft a config manually to get it running.

    if you wish to get it supported/included (quickly) in the GUI then you could create a pull request yourself or find a volunteer to create said pull request.
    PR's should probably go against the devel branch:
    https://github.com/pfsense/FreeBSD-ports/tree/devel/net/pfSense-pkg-frr

  • OSPF over WireGuard doesn’t work after router restart

    1
    0 Votes
    1 Posts
    645 Views
    No one has replied
  • BGP route redistributing

    1
    0 Votes
    1 Posts
    367 Views
    No one has replied
  • 0 Votes
    2 Posts
    530 Views
    J

    This got resolved with the prefix list filter incorrectly configured. Added allow all on prefix filter on inbound list filter and now traffic flows through the BGP routes.

    An additional concern is, we receive default route i.e. 0.0.0.0/0 from the ISP and some prefixes from another peer group. I have given weight of 1 to ISP neighbor and weight of 10 to peer group. Still majority of the traffic to the routes available from the peer group flows through the default routes. Please suggest, if any further changes required on this.

    Thanks

  • FRR - BGP - Multi-Path/ECMP

    Moved
    12
    0 Votes
    12 Posts
    8k Views
    ?

    @marceloalm_

    Hi we are building a similar network and in need to decide > between netgate or mikrotik router. There is any chance to > enable ecmp on current pfsense?

    I would assume that you will be better go with MikroTik
    RouterOS or VyOS.

    https://wiki.mikrotik.com/wiki/ECMP_load_balancing_with_masquerade

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.