• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Dummy WAN?

Scheduled Pinned Locked Moved General pfSense Questions
16 Posts 4 Posters 5.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    cyruspy
    last edited by Mar 22, 2010, 6:31 AM

    Hi, would it be possible to set the WAN interface as dummy?, I would like to install PFSense in 3 different sites, they'll be interconnected with private point-to-point links and only one of them will have internet connectivity.

    The setup would be something like this:

    S1
    IF1 - LAN
    IF2 - Link S1 to S2

    S2
    IF1 - LAN
    IF2 - Link S1 to S2
    IF3 - Link S2 to S3

    S3
    IF1 - LAN
    IF2 - Link S2 to S3
    IF3 - WAN, internet access

    I don't have enough interfaces to leave an unused card for WAN, how can I make this work with that limitation?

    1 Reply Last reply Reply Quote 0
    • G
      Gob
      last edited by Mar 22, 2010, 8:40 AM

      as far as i can see, there is nothing stopping you from using the WAN interface for one of your site to site links.

      If I fix one more thing than I break in a day, it's a good day!

      1 Reply Last reply Reply Quote 0
      • G
        GruensFroeschli
        last edited by Mar 22, 2010, 1:55 PM Mar 22, 2010, 12:04 PM

        "WAN" is just a name.

        However i would put the name "WAN" on the interface with the link facing towards the internet.
        So according to your list:

        
            LAN              LAN               LAN
              |               |                 |
             S1 WAN -----OPT1 S2 WAN ----- OPT1 S3 WAN ---- internet
        
        

        We do what we must, because we can.

        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

        1 Reply Last reply Reply Quote 0
        • C
          cyruspy
          last edited by Mar 22, 2010, 1:44 PM

          @Gob:

          as far as i can see, there is nothing stopping you from using the WAN interface for one of your site to site links.

          There are some assumptions about the WAN interface and default rules that I would like to avoid. Also, would be nice to have that interface free in case the other sites get their own Internet access (a full reconfiguration would be needed in that case if I use now WAN)

          1 Reply Last reply Reply Quote 0
          • G
            Gob
            last edited by Mar 22, 2010, 1:48 PM

            So you want to keep a WAN but not allocate a physical interface to it?
            Are you comfortable with using VLANs?

            If I fix one more thing than I break in a day, it's a good day!

            1 Reply Last reply Reply Quote 0
            • C
              cyruspy
              last edited by Mar 22, 2010, 2:04 PM Mar 22, 2010, 1:59 PM

              I want to keep "WAN" unused. Currently i'm testing the configuration with Virtualbox and the real site interconnect will be provided by a service provider, so I don't think I can use VLANs in this case….

              The idea is to have VPNs between the sites, i'm not sure about using IPSec or OpenVPN yet as some say IPSec has better performance others that OpenVPN is way better...

              I was planning to use IPSec. Filtering the connection coming from the tunnel might be needed (that's only possible with OpenVPN), and routing is a must (site 1 can only reach site 3 through site 2), i'm not sure if that's an issue with any of both...

              1 Reply Last reply Reply Quote 0
              • G
                Gob
                last edited by Mar 22, 2010, 2:18 PM

                You can still filter IPSEC tunnel traffic.
                Should be able to achieve the routing with static routes.

                Do you need to use a VPN if you are not routing over a public network?
                You can still filter between two pseudo LAN networks. You would get better performance if you are not encrypting traffic.

                If I fix one more thing than I break in a day, it's a good day!

                1 Reply Last reply Reply Quote 0
                • C
                  cyruspy
                  last edited by Mar 22, 2010, 2:54 PM Mar 22, 2010, 2:50 PM

                  Would be nice to avoid the tunneling, but is required by management. Apparently they don't trust the p2p provider. For the time being, I started testing the configuration with GruensFroeschli's suggestion.

                  1 Reply Last reply Reply Quote 0
                  • G
                    GruensFroeschli
                    last edited by Mar 22, 2010, 3:22 PM

                    What kind of site-to-site connections are you going to have?

                    If you have to encrypt traffic between the pfSense i highly recommend to use OpenVPN.
                    With OpenVPN you have to option to specify routes in the config file which are added dynamically to the routing table when the tunnel comes up.
                    (And get removed when the tunnel goes down, aka the link drops for whatever reasons)

                    With this you have the ability to create two routes (0.0.0.0/1 and 128.0.0.0/1) which point to the other side of the tunnel, effectively routing everything towards the internet.
                    After disabling automatic VPN rule generation you can assign the VPN interface as if it were a normal interface and create firewall rules for it.

                    So with your description i would:
                    Have one physical interface: LAN –> connect to LAN
                    Have one physical interface: WAN --> leave unconnected
                    Have one physical interface: OPT1 --> connect to "both" site-to-site connection. Put all the site-to-site connections in the same subnet. (is this possible)
                    Have as many as you need virtual VPN interfaces: OPT2, OPT3, --> connect over OPT1 to the other site-to-sites.

                    This would look like this:

                    
                    WAN -------|
                    LAN ----- S1---- OPT1-------|
                               |                |
                             OPT2(VPN)          |
                                  |             |
                                  |             |
                                  |             |
                                  |             |
                             OPT2(VPN)          |
                    WAN -------|                |
                    LAN ----- S2---- OPT1-------|
                               |                |
                             OPT3(VPN)          |
                                  |             |
                                  |             |
                                  |             |
                                  |             |
                             OPT2(VPN)          |
                              |                 |
                    LAN ----- S3---- OPT1-------|
                              |
                              |----- WAN --- internet
                    
                    

                    We do what we must, because we can.

                    Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                    1 Reply Last reply Reply Quote 0
                    • C
                      cyruspy
                      last edited by Mar 22, 2010, 5:53 PM

                      Wouldn't OpenVPN give lower throughput than IPSec?, why is it "highly recommended"?. It's not clear to me the "virtual IFs" usage  ???. The intersite connections are point to point fiber optic links provided by an external company, they're terminated as ethernet connections with their hardware. I'll check again, but currently i'm limited with interfaces, so i'm not sure I can assign one unused card to WAN (although it would be ideal).

                      1 Reply Last reply Reply Quote 0
                      • G
                        GruensFroeschli
                        last edited by Mar 23, 2010, 1:02 PM

                        Why do you think IPSec performs better than OpenVPN?
                        It all depends on what encryption you choose.
                        You might consider adding a hardware crypto accelerator to your setup if you intend to push close to wirespeed encrypted traffic.

                        I think for your application OpenVPN is better since you can actually route with it.
                        I usually dont use IPSEC so most of my experience with pfSense and IPSEC is from reading about it here.
                        What i've read is that you can't actually route into the IPSEC tunnel but more define ranges which get redirected (please someone correct me if i'm wrong with this).

                        For each OpenVPN instance you can create a virtual interface on the pfSense.
                        From the routing point of view there is no difference between such a virtual interface and a real interface.

                        Are these fiber links bridges?
                        Or does the terminating hardware do some kind of routing?

                        How many interfaces do you have available on your hardware?

                        We do what we must, because we can.

                        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                        1 Reply Last reply Reply Quote 0
                        • F
                          focalguy
                          last edited by Mar 23, 2010, 6:20 PM

                          @GruensFroeschli:

                          What i've read is that you can't actually route into the IPSEC tunnel but more define ranges which get redirected (please someone correct me if i'm wrong with this).

                          That's what I've read too and why I'm planning on changing 20+ IPSEC VPNs to OpenVPN.

                          1 Reply Last reply Reply Quote 0
                          • G
                            Gob
                            last edited by Mar 23, 2010, 8:29 PM

                            that's my plan with my 56 IPSEC tunnels, although waiting for the cert management that is built into pfSense v2

                            If I fix one more thing than I break in a day, it's a good day!

                            1 Reply Last reply Reply Quote 0
                            • C
                              cyruspy
                              last edited by Mar 23, 2010, 8:32 PM

                              As it's running in userspace, openVPN requires more context switches to do the same work. I'm testing it with a VM since I only could stablish one IPSec tunnel, the assistant for the second one didn't like my IP addressing apparently.

                              For what I know, the links are terminated by routers.

                              Currently site1 has 2 IFs, site2 has 2 IFs and site3 has 3. I think we can add more, but currently that's all we have.

                              1 Reply Last reply Reply Quote 0
                              • G
                                GruensFroeschli
                                last edited by Mar 23, 2010, 10:37 PM

                                This might interest you:
                                http://openvpn.net/archive/openvpn-users/2007-02/msg00088.html
                                Also googling IPSEC vs OpenVPN.

                                Yes OpenVPN is slower than IPSEC but IMO marginally.
                                Using an encryption which has hardware support on your platform will give you way bigger performance-gains than looking for optimizations on this level.

                                What hardware are you going to use?
                                Do you really need to tweak the least bit of performance?
                                I think the advantages you gain with OpenVPN (true routability!, NAT-able into the tunnel) weights more than having a few kbit/s more bandwith on the link ;)

                                We do what we must, because we can.

                                Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                                1 Reply Last reply Reply Quote 0
                                • C
                                  cyruspy
                                  last edited by Mar 24, 2010, 12:49 PM

                                  I'm not sure about the hardware, I think the're full blown PCs. The'll be provided by the client. Would be nice to have a demo config of this kind of setup in the book  ;D

                                  I still didn't try to route connection from site1 to site3 as i'm still having some connectivity issues with one direction of one of the tunnels…
                                  Ref: http://forum.pfsense.org/index.php/topic,23854.0.html

                                  1 Reply Last reply Reply Quote 0
                                  16 out of 16
                                  • First post
                                    16/16
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                    This community forum collects and processes your personal information.
                                    consent.not_received