Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ubiquiti USG-3P to PFSense

    Scheduled Pinned Locked Moved General pfSense Questions
    53 Posts 5 Posters 9.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      MacUsers @NightlyShark
      last edited by MacUsers

      @nightlyshark said in Ubiquiti USG-3P to PFSense:

      @macusers You need to be able to PPPoE from your USG to your ISP (Internet Provider) through your CPE (customer premises equipment, the cheep modem, router or both in one your ISP gives you), in order to have a true public IPv4. The ability to connect your own router (USG) through your CPE modem hinges on either have your CPE not block layer 2 direct PPPoE connections from other devices through it's modem (layer 2) stream (what is called PPPoE passthrough and is usually only enabled by calling your ISPs support and specifically request it) or have the CPE modem not connect to your ISP at all (bridge mode, again, consult your ISP for details). You then configure USG with PPPoE.

      PPPoE is a Layer 2 protocol, meaning its packets are not routable, eg are not sent to an IP from USG, but rather, the USG must be able to connect with your ISP on a "switch" (Data Link Layer) level, to put it simply, with MAC addresses. That is why the modem needs to allow PPPoE, because it bypasses it entirely. I hope I did not confuse the issue, some things may be lost in translation (english is my second language, not my native)

      I'm very confused here - perhaps the lack of my understandimg but very confused. I do get the real Public IPv4 from ISP, which is assigned to me as Static.

      This is tghe WAN setup on USG:
      WAN_USG.jpg

      And this WAN in pfSense:
      WAN_pfSense.jpg

      What am I missing?
      My another issue is: as USG cannot connect the CK (hence cannot adopt), cannot do much in terms of configuration on USG apart from those settings only.

      NightlySharkN 4 Replies Last reply Reply Quote 0
      • NightlySharkN
        NightlyShark @MacUsers
        last edited by NightlyShark

        @macusers To clarify:
        You want to have a topology of:
        ---INTERNET---
        ---ISP PPPoE endpoint---
        ---ISP CPE Modem with PPPoE passthrough enabled---
        ---USG PPPoE configuration of WAN interface---
        ---USG NAT---
        ---PfSense FW---
        ---Clients---

        or

        ---INTERNET---
        ---ISP PPPoE endpoint---
        ---ISP CPE Modem with PPPoE passthrough enabled---
        ---PfSense PPPoE configuration of WAN interface---
        ---PfSense NAT---
        ---USG and other Clients---
        ?

        1 Reply Last reply Reply Quote 0
        • NightlySharkN
          NightlyShark @MacUsers
          last edited by NightlyShark

          @macusers For example, my config is:
          ---INTERNET---
          ---ISP PPPoE endpoint---
          ---ISP CPE Modem with PPPoE passthrough enabled---
          ---PfSense:
          8cee6eb2-5042-4f01-a400-6e482d1a1b8f-image.png

          ---PfSense NAT---
          ---Clients---

          1 Reply Last reply Reply Quote 0
          • NightlySharkN
            NightlyShark @MacUsers
            last edited by

            @macusers USG and controller need to be in the same broadcast domain (same "switch", same VLAN, same IPv4 subnet, eg 192.168.1.2 for USG and 192.168.1.200 for the controller) in order to adopt devices. I am not trying to nag you, but this in particular is a UI community issue...

            M 1 Reply Last reply Reply Quote 0
            • NightlySharkN
              NightlyShark @MacUsers
              last edited by

              @macusers I edited the posts because I forgot the CPE modem... 😬

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                You can adopt devices between different subnets but you need to use a different method. Like at the CLI of the switch/ap etc.

                M 1 Reply Last reply Reply Quote 1
                • M
                  MacUsers @NightlyShark
                  last edited by MacUsers

                  @nightlyshark said in Ubiquiti USG-3P to PFSense:

                  @macusers USG and controller need to be in the same broadcast domain (same "switch", same VLAN, same IPv4 subnet, eg 192.168.1.2 for USG and 192.168.1.200 for the controller) in order to adopt devices. I am not trying to nag you, but this in particular is a UI community issue...

                  I'm not sure about if it's the special case for USG only but that's not true for Unifi switchs or APs. My controller is always on a seperate network and 12 other devices are happily adopted. As long long the device in question can ping the controller IP, it can be adopted. I think my issue is: USG doesn't know how to get to the 10.0.20.1/28 subnet from it's 192.168.10.1 address.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Hmm, the routing table implies it does.

                    Can it not ping to it?

                    1 Reply Last reply Reply Quote 0
                    • M
                      MacUsers @stephenw10
                      last edited by

                      @stephenw10 said in Ubiquiti USG-3P to PFSense:

                      You can adopt devices between different subnets but you need to use a different method. Like at the CLI of the switch/ap etc.

                      yeah, I tried from the CLI, but main issue is USG cannot reach to controller to send the adoption request - that was my 2nd issue in my original post. form CK to USG ping is fine but not the other way around.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Then check the firewall rules on the pfSense WAN

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          MacUsers @stephenw10
                          last edited by

                          @stephenw10 said in Ubiquiti USG-3P to PFSense:

                          Then check the firewall rules on the pfSense WAN

                          I have this rule on WAN interface:
                          7a8d18ff-093c-44bb-ac77-1b55f9ee3804-image.png

                          Source is wrong?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by stephenw10

                            Should be 'WAN net'. That will include the USG's interfacein the WAN subnet.

                            And you might want to allow icmp also if you're testing with ping.

                            M 1 Reply Last reply Reply Quote 1
                            • M
                              MacUsers @stephenw10
                              last edited by

                              @stephenw10 said in Ubiquiti USG-3P to PFSense:

                              And you might want to allow icmp also if you're testing with ping.

                              yeeppp!!!!
                              that was the issue - it needed ICMP enabled. the moment I did that I could adopt the USG in the controller.

                              Now, to fix the first issue - in coming VPN connection

                              1 Reply Last reply Reply Quote 1
                              • M
                                MacUsers
                                last edited by

                                @stephenw10, any idea what's might be the issue with VPN connection - double natting? Or need to setup some sort of port forwarding on USG?

                                -S

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  What sort of VPN is it? How are you testing?

                                  If it's incoming to pfSense then you will need to port forward that traffic in the USG.

                                  M 1 Reply Last reply Reply Quote 0
                                  • M
                                    MacUsers @stephenw10
                                    last edited by MacUsers

                                    @stephenw10
                                    it's OpenVPN. port forward teh traffic to VPN subnet or pfSense WAN IP?
                                    Normally I connect though mobile phone (to get out of home network) and VPN back to see if it's connecting.

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Forward the encrypted OpenVPN traffic to the pfSense WAN in the USG. So by default that would be UDP port 1194 but it could be whatever you configured it as.

                                      Steve

                                      1 Reply Last reply Reply Quote 1
                                      • M
                                        MacUsers
                                        last edited by

                                        VPN worked 👍

                                        1 Reply Last reply Reply Quote 1
                                        • M
                                          MacUsers
                                          last edited by

                                          @stephenw10
                                          Is it possible setup a static route (from WAN to LAN) on and disable NAT'ing on USG? IS it better? Or will it even work?

                                          -S

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            You must have NAT somewhere between your public IP and the private internal subnets in order for clients to be able to connect out and replies to know where to come back to.

                                            By default both the USG and pfSense will apply outbound NAT only one of them needs to. The USG needs to do it in your setup because it has the public IP to NAT to.

                                            You can disable outbound NAT on the USG as long as it has static routes to the subnets behind pfSense.

                                            Steve

                                            M 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.