• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

A simple question for a complicated setup

Scheduled Pinned Locked Moved Firewalling
11 Posts 2 Posters 623 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    madhatterfounder
    last edited by madhatterfounder Nov 6, 2022, 7:40 PM Nov 6, 2022, 7:40 PM

    Although I have a fairly complicated setup I could go into, I feel like that will just make it more complicated, and it really comes down to a simple question.

    In order to take advantage of the Stateful Firewall, is it required that the LAN interface be on the same layer2 as the destination? Or can you just static route through pfSense to the next Hop where Layer2 handoff is performed.

    In my scenario there is no private LAN, everything is public, but we do want to protect from certain ports on the internet. We dont need NAT or any of the other features for these subnets. Just the stateful firewall. I worry that there are certain layer2 TCP connections that keep the TCP sessions open.

    I was thinking it would be nice to use HSRP/VRRP on the WAN and the LAN, and static route to/from the single Carp address, as opposed to having hundreds of Carp addresses via Layer2. I realise that I would just be pushing that down to the next HOP, but in reality the pfSense is usually the weakest chain during a DDOS etc. This would also allow me to route around pfSense, or to a new instance of (easily)...

    Thanks,

    Hatter

    M C 2 Replies Last reply Nov 6, 2022, 7:47 PM Reply Quote 0
    • M
      madhatterfounder @madhatterfounder
      last edited by Nov 6, 2022, 7:47 PM

      That would also allow me to route different Public subnets through different CARP pairs. That would be amazing if I could route a subnet under a DDOS attack to a different pfSense stack (or something else).

      1 Reply Last reply Reply Quote 0
      • C
        chpalmer @madhatterfounder
        last edited by chpalmer Nov 6, 2022, 7:50 PM Nov 6, 2022, 7:49 PM

        @madhatterfounder

        Yes.

        I recommend 3 interfaces. Make one a maintenance interface that you can access pfSense from.

        Bridge the other two interfaces and use rules on them. Remember that rules apply to traffic heading into that interface.

        There is probably some more I'm missing but that is the general gist.

        Triggering snowflakes one by one..
        Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

        M 1 Reply Last reply Nov 6, 2022, 7:50 PM Reply Quote 0
        • M
          madhatterfounder @chpalmer
          last edited by Nov 6, 2022, 7:50 PM

          @chpalmer I dont think you can use Bridged interfaces with Carp

          C 1 Reply Last reply Nov 6, 2022, 7:52 PM Reply Quote 0
          • C
            chpalmer @madhatterfounder
            last edited by Nov 6, 2022, 7:52 PM

            @madhatterfounder Sorry missed the Carp part..

            I do not know if that is true or not as I have never researched it.

            Triggering snowflakes one by one..
            Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

            1 Reply Last reply Reply Quote 0
            • M
              madhatterfounder
              last edited by madhatterfounder Nov 6, 2022, 8:30 PM Nov 6, 2022, 8:24 PM

              I think the only reason to use bridged mode is when you dont have enough IP's to do static routing. For example at home, where the ISP only give you one IP. Otherwise bridged mode should be avoided. For a single device I think you need at least a /30, but if your running HA a /29.

              (I could be wrong but thats how I came to understand it)

              https://www.cisco.com/c/en/us/support/docs/dial-access/floating-static-route/118263-technote-nexthop-00.html

              C 1 Reply Last reply Nov 6, 2022, 8:51 PM Reply Quote 0
              • C
                chpalmer @madhatterfounder
                last edited by Nov 6, 2022, 8:51 PM

                @madhatterfounder

                in my case my ISP routes several IP's to me through a Cable modem therefore 1 interface inbound.. When I did it I could take and put my firewall in place and let it filter traffic from my connection to my switch.

                I did it this way many years ago so cannot remember specifics.. Setting up a quick bridge on my lab machine I do see things have changed slightly as the bridge itself no longer shows up in the firewall rules or as a separate interface as I remember it doing..

                I moved all my servers to a host so do not have it in place anymore. (cheaper than the electric bill and less noise..)

                Triggering snowflakes one by one..
                Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                1 Reply Last reply Reply Quote 0
                • M
                  madhatterfounder
                  last edited by Nov 7, 2022, 5:02 AM

                  I guess it is possible, I just found this

                  https://greigmitchell.co.uk/2019/08/configuring-intervlan-routing-with-a-layer-3-switch-and-pfsense/

                  1 Reply Last reply Reply Quote 0
                  • M
                    madhatterfounder
                    last edited by madhatterfounder Nov 7, 2022, 6:35 PM Nov 7, 2022, 6:33 PM

                    I thought of a potential issue that would prevent me from deploying this solution in my current deployment model. In that article they didnt explain the upstream route, but It would have had to of been a different switching stack or the uplink was directly to the pfSense WAN interface.

                    With my current hardware (pair of OS10 VLT switches) you can only create VRF interfaces (independent routing tables) on management ports, and if that's the case it wouldnt be possible to route the destination subnet (the "LAN subnet") to the pfSense WAN because the "LAN" subnet would exist as a VRRP/HSRP interface via layer2. It doesn't even look at the layer 3 routing table if it has a layer2 link. This would require that I deploy either an upstream or downstream switching pair.

                    Dang...

                    1 Reply Last reply Reply Quote 0
                    • M
                      madhatterfounder
                      last edited by madhatterfounder Nov 7, 2022, 9:33 PM Nov 7, 2022, 9:30 PM

                      Okay, I misunderstood the documentation. You can only add management interfaces to the management VRF, but you can have many non-management VRF's.

                      But still, having 2 separate routing tables is one thing, but I still dont think it would ignore a layer 2 link local address on a different VRF VLT/VRRP interface.

                      So now im researching that.

                      Thanks,

                      Dan

                      1 Reply Last reply Reply Quote 1
                      • M
                        madhatterfounder
                        last edited by Nov 8, 2022, 2:30 AM

                        Okay, I figured out the VLT+ Peer routing is superior to VLT + VRRP.

                        https://abhishektechdecoder.wordpress.com/2017/03/16/vrrp-vs-dell-vlt-peer-routing/

                        To Summarize, you dont need to waste a (3rd) virtual IP with peer routing, because either switch can respond to either IP that you assign them. And it also Load Balances the links as opposed to failover. So there is no real convergence.

                        1 Reply Last reply Reply Quote 0
                        11 out of 11
                        • First post
                          11/11
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received