Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    I have more interfaces than actual hardware ports

    Scheduled Pinned Locked Moved General pfSense Questions
    34 Posts 4 Posters 6.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      Is the modem giving you good public IPs to both the sonicwall and pfSense and not doing NAT?  If yes then you're good to go.

      As has been said, just forget about bridging on pfSense.  Get a switch.  Let your router route.  Let your switches switch.  You will be happier and your network will perform better and everytime you post people won't be saying, "What are you doing bridging?  Just get a switch!"  Classic case where "just because you can doesn't mean you should" applies.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • A
        altiris
        last edited by

        @Derelict:

        Is the modem giving you good public IPs to both the sonicwall and pfSense and not doing NAT?  If yes then you're good to go.

        As has been said, just forget about bridging on pfSense.  Get a switch.  Let your router route.  Let your switches switch.  You will be happier and your network will perform better and everytime you post people won't be saying, "What are you doing bridging?  Just get a switch!"  Classic case where "just because you can doesn't mean you should" applies.

        Well we have 5 ips to choose from, really 3 as two other ips are being used by computers. On the SonicWall we assign one ip and then on pfsense we assign another. Yeah I am finally agreeing with you and getting a switch for one interface and connecting everything to the switch. Currently I do not have a switch but will try buying one today or tomorrow. Could I use the router that is set in bridge mode (currently it'a connected to the modem as in the diagram) in the mean time to replace what a switch would be doing until I buy a switch? Also, does a bridge add another "layer" to the network in any way (by layer I mean like having one router connected to another or something)?

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          What hardware are you running pfSense on?
          Whilst it is possible bridge your interfaces and have them behave like a switch it's usually a bad idea for the reasons already given.
          If however you end up with unused ports that you want to add to a bridge I did write some instructions a while ago:
          https://forum.pfsense.org/index.php/topic,48947.msg269592.html#msg269592

          To answer your original question, you can easily end up with more interfaces than you have ports because some interface types are 'virtual'. This includes VLAN interfaces, PPPoE interfaces and bridge interfaces.

          Steve

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            A bridge is a layer 2 device.  It might have an IP address for management purposes but it doesn't appear as an IP "hop" in traceroutes and the like.

            I don't know if the router you have between the firewalls and the modem is necessary to what you're doing.  It really sounds like you need switches on the outside (for your modem, public IPs, and firewall WAN ports) and the inside networks (for your workstations, access points, etc.)

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • A
              altiris
              last edited by

              @Derelict:

              A bridge is a layer 2 device.  It might have an IP address for management purposes but it doesn't appear as an IP "hop" in traceroutes and the like.

              I don't know if the router you have between the firewalls and the modem is necessary to what you're doing.  It really sounds like you need switches on the outside (for your modem, public IPs, and firewall WAN ports) and the inside networks (for your workstations, access points, etc.)

              yes I need switches but the way I have everything set up is temporary and has been that way for a while as I've been looking for a replacement to my tz 210 as it has been giving me problems however my father wants his stuff behind the tz 210. I have the router configured in bridge mode so I could say it'd acting LIKE a switch..I'm going to try to buy one today or tomorrow. Ultimately when I buy my switch it will just be modem > pfsense box > switch in one interface and then either the SonicWall will be on its own interface with different subnet separated, or connected to the switchurch OR eliminated entirely as its just acting really crappy.

              1 Reply Last reply Reply Quote 0
              • A
                altiris
                last edited by

                @stephenw10:

                What hardware are you running pfSense on?
                Whilst it is possible bridge your interfaces and have them behave like a switch it's usually a bad idea for the reasons already given.
                If however you end up with unused ports that you want to add to a bridge I did write some instructions a while ago:
                https://forum.pfsense.org/index.php/topic,48947.msg269592.html#msg269592

                To answer your original question, you can easily end up with more interfaces than you have ports because some interface types are 'virtual'. This includes VLAN interfaces, PPPoE interfaces and bridge interfaces.

                Steve

                it's running on a standard desktop PC I built. core i3 4150, 8gb ddr3 1600mhz, asus z78 pro mobo, and two HP NC364T which use the Intel 8751 chipset or something. I've seen your instructions actually a little while ago ha ha, I've read it again and I notice you say one proceduee can be done if I don't need to worry about adding ruses on the interfaces, however I need to add some ports. Then at the end you say no rules will need to be added on the interfaces as it will inherit the rules from Lan, so would I just add the rules on lan?

                I still want to go for a switch but this is interesting now and I'd like to know if you could answer that one question I have so I would know for future cases in case I ever wanted or somehow had to bridge interfaces.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Just run 'ifconfig' at the console and it will show you all the interfaces in the box whether or not they are assigned or enabled. Paste if here if you have any more questions about it.

                  Steve

                  1 Reply Last reply Reply Quote 0
                  • A
                    altiris
                    last edited by

                    Alright so I have hooked up a router configured in bridge mode (that's all I have to act as a switch atm) to the LAN interface and now since I have dhcp enabled on the lan interface, anything plugged into that switch that is configured to automatically get an IP will in fact get one right?

                    Also, will pfSense still be able to monitor what devices are connected (since everything is going from the switch and then to lan)?

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yes, as long as the router really is only switching.
                      pfSense will know which devices have which IP addresses and hence what is connecting to outside addresses. It will not have any knowledge of traffic between devices on the switch.

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • A
                        altiris
                        last edited by

                        @stephenw10:

                        Yes, as long as the router really is only switching.
                        pfSense will know which devices have which IP addresses and hence what is connecting to outside addresses. It will not have any knowledge of traffic between devices on the switch.

                        Steve

                        alright sounds good. Don't know if you can give me a hand with this but I have hooked up a server/computer I have to the switch (remember switch is connected to LAN interface) and I want to establish a link with the internal ip and external IP, so I will have to do a 1:1 NAT. I did one and I also made a rule on the firewall on the wan interface to allow traffic from Port 443 (testing purpoes) on my internal IP but when I type my external IP into the address bar from another computer nothing will load. I will post screenshot in a few seconds.

                        Firewall.jpg
                        Firewall.jpg_thumb
                        NAT.jpg_thumb
                        NAT.jpg

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          Why did you put a destination in your 1:1?  Did you read the text?

                          ![Screen Shot 2014-12-28 at 6.30.28 PM.png](/public/imported_attachments/1/Screen Shot 2014-12-28 at 6.30.28 PM.png)
                          ![Screen Shot 2014-12-28 at 6.30.28 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2014-12-28 at 6.30.28 PM.png_thumb)

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Do you need all ports NAT'd to the server? You should probably use a single port forward, for testing at least, instead.
                            However if you do want 1:1 NAT it should be on the WAN interface and the 'destination' should be left as 'any'.
                            Since your pfSense box is behind the Sonicwall device is it's WAN address a private IP? If so you need to uncheck 'block private networks' in the WAN interface setup.
                            Lastly you will need to test your port forward from a device on the WAN side of the pfSense box.

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • A
                              altiris
                              last edited by

                              @Derelict:

                              Why did you put a destination in your 1:1?  Did you read the text?

                              I got confused when reading this lol https://doc.pfsense.org/index.php/Why_does_enabling_NAT_Reflection_break_web_surfing

                              EDIT: Actually, if I leave the destination with a * then I am unable to surf the web on that machine. I have to set an IP for the destination if I want to be able to browse the web with 1:1 NAT.

                              1 Reply Last reply Reply Quote 0
                              • A
                                altiris
                                last edited by

                                @stephenw10:

                                Do you need all ports NAT'd to the server? You should probably use a single port forward, for testing at least, instead.
                                However if you do want 1:1 NAT it should be on the WAN interface and the 'destination' should be left as 'any'.
                                Since your pfSense box is behind the Sonicwall device is it's WAN address a private IP? If so you need to uncheck 'block private networks' in the WAN interface setup.
                                Lastly you will need to test your port forward from a device on the WAN side of the pfSense box.

                                Steve

                                I selected lan instead of wan by accident lol but I don't know whether I should do Port Forward or just 1:1 NAT. I do not want all ports to be opened and the way I am doing it is 1:1 NAT which forwards/allows everything from the external IP to internal IP or something like that right? However because pfsense has a firewall, it is preventing from all ports being accessible to LAN right? So essentially either Port forward of One-to-one nat will do the same thing???

                                1 Reply Last reply Reply Quote 0
                                • A
                                  altiris
                                  last edited by

                                  Ugh so I thought I got it working but I didn't. I am trying to port forward instead of just doing 1:1 NAT. I can't seem to get it working. Do I need to add a rule to the firewall and I saw in a video someone making a virtual ip alias in pfsense, do I need to one to do one? I'll try and postake a screen shot.

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    This is a sample rule forwarding Minecraft on TCP:25565 (minecraft_server port alias set to 25565) to my os_x_server (host alias defined as 192.168.223.17).  Note that I let the NAT configuration  create the firewall rule so I don't have to using the filter rule association.

                                    If I wanted the incoming connections to be addressed to anything other than "WAN address" I would have to create a VIP.  In this case I don't.

                                    port-forward.png
                                    port-forward.png_thumb

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      altiris
                                      last edited by

                                      @Derelict:

                                      This is a sample rule forwarding Minecraft on TCP:25565 (minecraft_server port alias set to 25565) to my os_x_server (host alias defined as 192.168.223.17).  Note that I let the NAT configuration  create the firewall rule so I don't have to using the filter rule association.

                                      If I wanted the incoming connections to be addressed to anything other than "WAN address" I would have to create a VIP.  In this case I don't.

                                      I try following your steps but it doesnt work. I noticed how you said if you wanted incoming connections to be anything other than the WAN address of pfsense you would have to create a virtual ip. So, since the WAN address of my server and pfsense box are different (I want incoming connections for a certain IP and port 80 to go to internal IP). Only thing I dont get like you do isthe NAT association rule.

                                      Ive blocked out my WAN IP in the images for privacy reasons…but I hope its still enough that you can have an idea on what I am doing incorrectly.

                                      Screenshot-1.png_thumb
                                      Screenshot-1.png
                                      Screenshot.png_thumb
                                      Screenshot.png

                                      1 Reply Last reply Reply Quote 0
                                      • DerelictD
                                        Derelict LAYER 8 Netgate
                                        last edited by

                                        Looks like it should work to me.

                                        Is the proper Firewall rule on Firewall > Rules > WAN??

                                        Everything configured right on the web server and it has its default gateway set to pfSense?

                                        No software firewall on the web server blocking access from foreign networks?

                                        Web server is actually running and listening on tcp/80?

                                        Not much else to it.

                                        Chattanooga, Tennessee, USA
                                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          altiris
                                          last edited by

                                          @Derelict:

                                          Looks like it should work to me.

                                          Is the proper Firewall rule on Firewall > Rules > WAN??

                                          Everything configured right on the web server and it has its default gateway set to pfSense?

                                          No software firewall on the web server blocking access from foreign networks?

                                          Web server is actually running and listening on tcp/80?

                                          Not much else to it.

                                          Well to go back, when I create a Virtual IP (one that will be used to assign to my server) if I type in that IP I am brought to a pfsense page, which isnt what I want. I want to be brought to my web servers page. So I guess I have to remove the virtual IP? As for proper firewall rules, the rule that gets created from  making the NAT port forwarding is in the WAN interface. Everything on the server side is correct yet I when I try to access the web server with the external IP nothing loads.

                                          1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate
                                            last edited by

                                            try changing the type of virtual IP to proxy arp.  that will absolutely prevent any services on the firewall node from binding to it.

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.