Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense 2.0 transparent firewall / firewall bridge

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 7 Posters 90.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • chpalmerC
      chpalmer
      last edited by

      Thanks dabgdk!

      Nice writeup!!

      Triggering snowflakes one by one..
      Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

      1 Reply Last reply Reply Quote 0
      • H
        hvar
        last edited by

        Thank you ever so much for this guide! I have been struggeling with this for some time, and this was of great help!!

        I did not however get all the way home:

        I made a bridge with WAN+LAN+DMZ interfaces following your guide. I also assigned one additional interface for MGMT outside the bridge with a static IP.

        1. I have made rules on all interfaces with "allow everything", but still cannot access the IP-adress I assigned to the bridge (no ping, no http(s) nothing. Neither from LAN nor WAN nor DMZ. What could be wrong? (I can only access the unit via the MGMT interface on the IP assigned to it.)

        2. I want to have pfsense run a DCHP server on LAN interface only. Can this be done?

        1 Reply Last reply Reply Quote 0
        • T
          thevoice
          last edited by

          Hi,

          I don't know if I'm blind or what, but can't figure out where is the step 4 : Interfaces → Assign → Network Port.

          I have pfSense 2.0.1-RELEASE and this is not inside any menus. Have you screenshots of your steps? Would be helpful!

          Also, is you setup almost the same for dual WAN if I want to get both WAN external IPs available on a optional interface example : DMZ?

          Thank you,

          Alexandre.

          1 Reply Last reply Reply Quote 0
          • T
            thevoice
            last edited by

            Sorry I found the Network Port… now following other steps!

            1 Reply Last reply Reply Quote 0
            • D
              dabgdk
              last edited by

              hvar: I believe there are other guides that do show how to do a bridge setup with an additional interface for management; this is the "traditional" way to setup a firewall bridge. This guide is for those wishing to setup a firewall bridge using only 2 interfaces.

              1 Reply Last reply Reply Quote 0
              • S
                seanlee
                last edited by

                For virtual environments (VMware), what does the switching look like on the ESX host? Which NICS go on which vSwitch ports etc? I know you have to enable promiscuous mode…

                Example:
                I have 2 VM's, one is a CentOS VM with an IPV4 address (One NIC), and the other is a pfSense fw setup to be transparent (Two NICs, followed steps above). On the ESX host, I have a WAN vSwitch and a LAN vSwitch. The CentOS VM is on the LAN vSwitch (the LAN vSwitch has no uplinks at all). The pfSense VM has one NIC on the LAN vSwitch, and one NIC on the WAN vSwitch. As of right now, my CentOS VM can communicate out, but nothing can communicate in.

                Ideas?

                -Sean

                1 Reply Last reply Reply Quote 0
                • S
                  seanlee
                  last edited by

                  Anyone?

                  1 Reply Last reply Reply Quote 0
                  • M
                    micano
                    last edited by

                    Hi,
                    I have tried this setup and it worked to some extend. However, the idea is to configure limiters per host/ip based on layer 7 and/or general conditions.
                    1. When I create a simple rule with In/Out limiters to TCP/UDP everything works fine and the traffic is limited as supposed to.
                    2. As soon as I create L7+In/Out+TCP/UDP rule the traffic assigned to L7 rule seems to be blocked as well as some other(???).
                    L7 rule is: protocol - httpvideo, structure - limiter and a precreated limiter is assigned.
                    3. Dhcp, dhs, file sharing work fine with or without L7 rules being setup. And traffic is nicely assigned to a limiter dependent on conditions (destinations or source)

                    Could L7 limiters be setup in a bridge config? Has someone configured anything similar?
                    This link states that net.link.bridge.pfil_member should be set to "0" http://doc.pfsense.org/index.php/Traffic_Shaping_Guide
                    To which interface a floating rule should be applied? In some cases it doubles the speed configured by the limiter.

                    Any info would help. Thank You.

                    FYI:
                    I have also tried this config in Hyper-V and after step 7 lost connectivity to pfsense. ifconfig down/up for all interfaces did not help.

                    1 Reply Last reply Reply Quote 0
                    • D
                      dabgdk
                      last edited by

                      Unfortunately, I made this guide AFTER I placed the system into production. It is possible that I missed a crucial step in writing the guide.

                      However, I would guess that if you are having trouble connecting to the web interface after step 7, I would highly suggest that you take a close look at your firewall rules.

                      In my case, I actually did not add ANY rules to the interfaces; I simply started with a single "Allow All" rule in the "Floating" rules section (step 6). Later on (step 10), I added allow rules for crucial services (INCLUDING THE WEB GUI) and then removed the "Allow All" rule.

                      1 Reply Last reply Reply Quote 0
                      • D
                        dabgdk
                        last edited by

                        It just occurred to me: the order in which you set the interfaces to 'none' in step 7 might be important. I would set WAN first, then LAN.

                        1 Reply Last reply Reply Quote 0
                        • B
                          btarrh
                          last edited by

                          Give this a try. I wrote this a few months back and it's in its final revision.

                          Transparent Firewall-Filtering Bridge - pfSense 2.0.2
                          http://people.pharmacy.purdue.edu/~tarrh/Transparent%20Firewall-Filtering%20Bridge%20-%20pfSense%202.0.2%20By%20William%20Tarrh.pdf

                          1 Reply Last reply Reply Quote 0
                          • JKnottJ JKnott referenced this topic on
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.