Connect to bridged DSL modem (not PPPoE)
-
Hi,
I've been reading several threads about this, but most of them were focused on PPPoE (creating an OPT int., but I have no spare interfaces to assign).
On my pfSesnse box I only have two interfaces:
- WAN (dynamically assigned by my ISP)
- LAN (192.168.1.0/24)
pfSense management is 192.168.1.1/24
The ISP modem has an address of 192.168.1.254/24 that I'd like to keep, if possible.
I think I just need a NAT rule to be able to reach the modem, but which one? :)
-
Can't have both interfaces on the same subnet.
If your modem is bridged then it means your WAN is getting a public IP or.. Do you mean your double natted?
-
Hey chpalmer,
Yes, the modem (Actiontec) is bridged, and gets a public IP on its WAN interface. Still has an address of 192.168.1.254 on its LAN interface.
If I connect a laptop to one of the LAN ports of the modem I can connect to the modem GUI no problem.However, I cannot do the same from my LAN (going through the router). I think that all the traffic from the LAN (192.168.1.0/24) is routed by pfSense through the WAN IP, so that's my problem. Would a NAT rule be able to accomplish that?
Hope that makes sense. :)
-
Please post a "screenshot" of your pfSense Dashboard
-
-
As noted/pointed before, if you have the "modem" on 192.168.1.0/24 and your pfSense LAN on 192.168.1.0/24 (Same Network segment), it won't going to work…, you need to change one of them (Modem or pfSense LAN) to "other" Network Segment...
-
I changed the modem LAN to 192.168.2.0/24, the modem management IP is now 192.168.2.254.
To clarify, I'm not using double NAT. My ISP allows you to bridge one of the LAN interfaces (port 1), which is connected to my pfSense box.
I'm not sure what NAT rule I need to create in order to get devices in my LAN to reach the modem mgt, if that's at all possible.
I read the guide…
https://doc.pfsense.org/index.php/Accessing_modem_from_inside_firewall
...but the guide assumes a PPPoE setup. My provider does not use PPPoE, so there is that. :D
-
To clarify, I'm not using double NAT.
If your modem is providing a NAT address and you're using NAT with pfSense, then yes you are double NAT.
-
To clarify, I'm not using double NAT.
If your modem is providing a NAT address and you're using NAT with pfSense, then yes you are double NAT.
No, it's not double NAT. ::) Perhaps you should read the information I posted earlier.
The modem is setup in bridge from the WAN interface to port 1 of its LAN interface. I get the same public IP on both the WAN interface on the modem AND the WAN interface on the pfSense box. -
You need to add an alias address to the WAN interface in the WAN interface setup page DHCP client section. Add an address from the 192.168.2.0/24 subnet, for example 192.168.2.200/24, renew the WAN DHCP lease to let the setting be applied.
Then you need to add an outbound NAT rule at Firewall->NAT->Outbound. Switch to manual mode first if you haven't and save settings. Then add a new outbound NAT rule with interface "WAN", source network "192.168.1.0/24" (your LAN), destination "192.168.2.254/32" (the modem), translation address "other network" and other subnet "192.168.2.200" (the alias address you entered above). This rule should be the first rule in the outbound NAT rule list.
If you ask me I would have renumbered the LAN and let the modem have its default management address, if you ever need to reset settings on the modem to factory defaults you'll have to go trough the IP address change again.
HTH
Edit: This will not work if the management IP is not set on the bridge interface on the modem but is instead only on the NAT'ed LAN ports of the modem.
-
I get the same public IP on both the WAN interface on the modem AND the WAN interface on the pfSense box.
The public IP will no longer be active on your modem while it is bridge mode.
Now that you have this set up can you reach it?
-
I get the same public IP on both the WAN interface on the modem AND the WAN interface on the pfSense box.
The public IP will no longer be active on your modem while it is bridge mode.
Now that you have this set up can you reach it?
I'm pretty sure he means that he has the same subnet on the WAN side of the modem and the WAN side of pfSense (the LAN side of the modem).
-
I get the same public IP on both the WAN interface on the modem AND the WAN interface on the pfSense box.
The public IP will no longer be active on your modem while it is bridge mode.
Now that you have this set up can you reach it?
I must have explained my setup poorly, sorry. :) I'll try again:
ISP (DSL provider, not PPPoE) > Actiontec T2200H modem / router > pfSense firewall router > LAN
-
ISP (telus): provides a dynamically assigned public IP addresses (say it's 1.2.3.4, gateway 1.1.1.1)
-
T2200H (modem/router): the T2200H gets an IP (say the IP is 1.2.3.4 for simplicity) on the WAN interface: this connection is bridged to port 1 on the LAN side of the T2200H (*); the remaining 3 ports on the T2200H still do NAT, but there is nothing connected to them - The LAN subnet on the T2200H is now 192.168.2.0/24, and the mgr IP is 192.168.2.254. I connected port 1 (the bridged interface) of the T2200H to the WAN int. of my pfSense box
-
pfSense (firewall, NAT): the same 1.2.3.4 external address and 1.1.1.1 gateway are assigned to the WAN interface. The LAN subnet is 192.168.1.0/24, mgt at 192.168.1.1
(*) this is an option the ISP (telus) finally introduced after people complained that they wanted to use their own router, but didn't want to double NAT. It's sort of explained on this page:
https://forum.telus.com/t5/Home/Bridge-Mode-Using-Your-Own-Router/ta-p/52181
-
-
@kpa:
You need to add an alias address to the WAN interface in the WAN interface setup page DHCP client section. Add an address from the 192.168.2.0/24 subnet, for example 192.168.2.200/24, renew the WAN DHCP lease to let the setting be applied.
Then you need to add an outbound NAT rule at Firewall->NAT->Outbound. Switch to manual mode first if you haven't and save settings. Then add a new outbound NAT rule with interface "WAN", source network "192.168.1.0/24" (your LAN), destination "192.168.2.254/32" (the modem), translation address "other network" and other subnet "192.168.2.200" (the alias address you entered above). This rule should be the first rule in the outbound NAT rule list.
If you ask me I would have renumbered the LAN and let the modem have its default management address, if you ever need to reset settings on the modem to factory defaults you'll have to go trough the IP address change again.
HTH
Edit: This will not work if the management IP is not set on the bridge interface on the modem but is instead only on the NAT'ed LAN ports of the modem.
I did try what you suggest, but it's still not working. Cannot ping 192.168.2.254, or see the GUI.
I admit I don't understand the concept of DHCP alias. I changed the modem IP because it was easier, I have several static IP and reservations on the LAN side.![pfsense NAT outbound.png_thumb](/public/imported_attachments/1/pfsense NAT outbound.png_thumb)
![pfsense NAT outbound.png](/public/imported_attachments/1/pfsense NAT outbound.png)
![WAN DHCP alias.png_thumb](/public/imported_attachments/1/WAN DHCP alias.png_thumb)
![WAN DHCP alias.png](/public/imported_attachments/1/WAN DHCP alias.png) -
Because your not using any PPP tunnel, the modems (new) subnet is outside your local LAN. So any requests to that new subnet (192.168.2.x) will pass through your pfSense router from your LAN and through/to the modem by default. Since there is no tunnel the modem interface will see the attempt without any extra configuration on your part on the pfSense box.
The only issue that there could be is that the modem itself does not have a path back to your LAN. Many DSL modems (unlike most cable modems/bridges) do not have a specified (gateway) on their maintenance interface and therefore do not send any traffic outside their own subnet.
Easy way- (Probably a huge security hole) would be to connect your LAN switch to a second port on the modem and put the modem back on 192.168.1.x. Then make a firewall rule on your LAN interface that blocks the modem IP from anything. Requests from anything on your LAN would pass back and forth on your local LAN without any traffic transversing the pfSense box. You could try this as a test and then unplug it when not in use. (how often do you need to see your modem stats anyways..)
Otherwise- you need to provide a path from 192.168.2.254 on your wan to 192.168.1.0/24 on your LAN. The modem likely does not know on it's own.
-
@kpa:
Edit: This will not work if the management IP is not set on the bridge interface on the modem but is instead only on the NAT'ed LAN ports of the modem.
I think that this is actually the case.
-
I think that this is actually the case.
Ive heard there is one or two modems out there like this but Ive never run into any of them.. What model do you have?
-
I think that this is actually the case.
Ive heard there is one or two modems out there like this but Ive never run into any of them.. What model do you have?
This is actually very common on any modem/router that allows you to set the LAN ports individually as bridge or NAT. On the brigded ports the management interface which is the nat'ed LAN interface is completely hidden because it's behind the NAT and firewall from the perspective of the bridged network segment. There is no additional management IP set on the bridge because that would be reduntant.
-
I think that this is actually the case.
Ive heard there is one or two modems out there like this but Ive never run into any of them.. What model do you have?
ISP (DSL provider, not PPPoE) > Actiontec T2200H modem / router > pfSense firewall router > LAN
-
Yes, the modem (Actiontec) is bridged, and gets a public IP on its WAN interface. Still has an address of 192.168.1.254 on its LAN interface.
If I connect a laptop to one of the LAN ports of the modem I can connect to the modem GUI no problem.This would show that your modem is reachable in bridge mode.
And found this at DSLR.. take it for what it is worth. I don't know this posters knowledge to be accurate or not.. But based on your comment above it seems accurate.
RFC1483 bridging will bridge the WAN or DSL interface on the Actiontec device with all of the Ethernet ports on the LAN side of the device.
Once you enable bridging, one router that's connected to any of the ports on the device will become your new network gateway. After you do that, the only reason to plug anything else into the Actiontec device will be if it were on DSL service and you wanted to access the graphical statistics, at which point you'd configure a device manually (with some random IP like 192.168.1.152) so that you can go to the device's administration pages.
His comment was to someone on pppoe.
When I had "bridged service" from my ISP at one of our remote outposts (no pppo anything) I was able to reach the modems maintenance page from any computer on the network without any changes to the firewall. It just worked out of the box. Modem was a bridge only device and had no on board router. If you haven't tried (with the new address) this Id suggest you do.
All of our other dsl connections are pppoe and therefore the pfSense boxes need to be set up.
-
Yes, the modem (Actiontec) is bridged, and gets a public IP on its WAN interface. Still has an address of 192.168.1.254 on its LAN interface.
If I connect a laptop to one of the LAN ports of the modem I can connect to the modem GUI no problem.This would show that your modem is reachable in bridge mode.
OK, one last attempt at explaining. :D The Actiontec modem has 4 "LAN" ports, but only 1 of these 4 ports can be configured (if the user so wishes - it's not by default), to be bridged with the WAN interfaces. As I like to use my own router, and I do not like double NAT, I did use this option. However, this "bridge" only works / affects LAN port 1. The remaining 3 "LAN" ports (port 2, 3 and 4) still operate as you had not bridged port 1, and will NAT the WAN connection.
So, for instance, if I now connect a laptop directly to "LAN" port 2 on the modem, I get a NATed address of 192.168.2.2 from the Actiontec, AND I'm able to access the modem GUI at 192.168.2.254.
And found this at DSLR.. take it for what it is worth. I don't know this posters knowledge to be accurate or not.. But based on your comment above it seems accurate.
RFC1483 bridging will bridge the WAN or DSL interface on the Actiontec device with all of the Ethernet ports on the LAN side of the device.
Once you enable bridging, one router that's connected to any of the ports on the device will become your new network gateway. After you do that, the only reason to plug anything else into the Actiontec device will be if it were on DSL service and you wanted to access the graphical statistics, at which point you'd configure a device manually (with some random IP like 192.168.1.152) so that you can go to the device's administration pages.
His comment was to someone on pppoe.
When I had "bridged service" from my ISP at one of our remote outposts (no pppo anything) I was able to reach the modems maintenance page from any computer on the network without any changes to the firewall. It just worked out of the box. Modem was a bridge only device and had no on board router. If you haven't tried (with the new address) this Id suggest you do.
All of our other dsl connections are pppoe and therefore the pfSense boxes need to be set up.
No, that is NOT accurate - how old is that post? It's not how the telus firmware works these days. I posted a link from the ISP website earlier on how their modem works. For a long while, the root password for the telus firmware was semi-public, and you could login as root and bridge all ports or whatever.
All that has been changed several years ago, when the telus decided to allow bridging "officially", but only for port 1. Since then, if you like to use your own router, that's the best option you have.
-
OK, one last attempt at explaining. :D The Actiontec modem has 4 "LAN" ports, but only 1 of these 4 ports can be configured (if the user so wishes - it's not by default), to be bridged with the WAN interfaces. As I like to use my own router, and I do not like double NAT, I did use this option. However, this "bridge" only works / affects LAN port 1. The remaining 3 "LAN" ports (port 2, 3 and 4) still operate as you had not bridged port 1, and will NAT the WAN connection.
So, for instance, if I now connect a laptop directly to "LAN" port 2 on the modem, I get a NATed address of 192.168.2.2 from the Actiontec, AND I'm able to access the modem GUI at 192.168.2.254.
I know my eyesight isn't as good as it used to be but this is the first time in this thread you have mentioned it this way.
You actually have internet past your pfSense box and on ports 2-4 on your modem when both have the same public IP address?? :o
What comes up if you try and access your public IP address from a browser?
-
OK, one last attempt at explaining. :D The Actiontec modem has 4 "LAN" ports, but only 1 of these 4 ports can be configured (if the user so wishes - it's not by default), to be bridged with the WAN interfaces. As I like to use my own router, and I do not like double NAT, I did use this option. However, this "bridge" only works / affects LAN port 1. The remaining 3 "LAN" ports (port 2, 3 and 4) still operate as you had not bridged port 1, and will NAT the WAN connection.
So, for instance, if I now connect a laptop directly to "LAN" port 2 on the modem, I get a NATed address of 192.168.2.2 from the Actiontec, AND I'm able to access the modem GUI at 192.168.2.254.
I know my eyesight isn't as good as it used to be but this is the first time in this thread you have mentioned it this way.
You actually have internet past your pfSense box and on ports 2-4 on your modem when both have the same public IP address?? :o
What comes up if you try and access your public IP address from a browser?
I'm glad this helped. :) Just to make sure we're on the same page, as stated before, there is usually nothing connected to ports 2-4 on the modem (except when I connect my laptop to look at the modem GUI).
Browsing to my public IP: From my LAN, I get the pfSense login. From the outside, nothing.
kpa seems to have understood my setup correctly a while ago, he must be a mind reader. ;D
-
he must be a mind reader. ;D
Yea well my wife thinks Im one too once in a while.. Ive tried to tell here Im not. :o ;)
So- same question.. If you plug something into 2-4 can you reach the internet?
If you plug a computer directly into port 1 can you reach the maintenance port?
Right now Im of the thought that you need a third interface on that pfSense box to make this work. Even if it were a USB ethernet adapter which I swore Id never use. But for a maintenance access interface I might consider it.
-
he must be a mind reader. ;D
Yea well my wife thinks Im one too once in a while.. Ive tried to tell here Im not. :o ;)
So- same question.. If you plug something into 2-4 can you reach the internet?
Yes, I can reach the Internet. The laptop gets a NATted address of 192.168.2.2.
If you plug a computer directly into port 1 can you reach the maintenance port?
Right now Im of the thought that you need a third interface on that pfSense box to make this work. Even if it were a USB ethernet adapter which I swore Id never use. But for a maintenance access interface I might consider it.
I have actually never tried that, but the more I think about the least I think it would work. I might give it a shot when I'm back from work.
Other people on the telus forum are confirming that the GUI is not accessible from the bridged port, and are using a secondary wired connection to one of the non-bridged (2,3,4) modem LAN ports, which makes sense. I think we can close the file on my original request as "not possible".
-
Then how Id do it if I was going to would be a third interface programmed with an address in the subnet of the modem maintenance address plugged into port 2-4 on the modem.
No firewall rules on that interface.
Let pfSense do the routing for you. :)
-
@kpa:
You need to add an alias address to the WAN interface in the WAN interface setup page DHCP client section. Add an address from the 192.168.2.0/24 subnet, for example 192.168.2.200/24, renew the WAN DHCP lease to let the setting be applied.
Then you need to add an outbound NAT rule at Firewall->NAT->Outbound. Switch to manual mode first if you haven't and save settings. Then add a new outbound NAT rule with interface "WAN", source network "192.168.1.0/24" (your LAN), destination "192.168.2.254/32" (the modem), translation address "other network" and other subnet "192.168.2.200" (the alias address you entered above). This rule should be the first rule in the outbound NAT rule list.
If you ask me I would have renumbered the LAN and let the modem have its default management address, if you ever need to reset settings on the modem to factory defaults you'll have to go trough the IP address change again.
HTH
Edit: This will not work if the management IP is not set on the bridge interface on the modem but is instead only on the NAT'ed LAN ports of the modem.
Old thread I know.
But many thanks for this advice - it is the only information I could find to set up a non PPPOE (DHCP Bridged NBN Modem)Essentially to repeat: In my case Modem is 192.168.3.100
LAN is 192.168.1.0/24
WAN is DHCP assigned 121.223.12.21 etcAs you describe I added alias address to WaN interface DHCP client section. Adding 192.168.3.200/24
Outbound NAT rules - Manual.
New Outbound NAT rule: Interface WAN, Source 192.168.1.0/24, destination 192.168.3.100/32 (the modem), translation 'other subnet' 192.168.3.200 (matching earlier WAN alias)
Moved to top of first rule.Apply Changes
And can access the Modem GUI at 192.168.3.100 (!)
Glenn
-
@GlennNZ Old thread I know too :) newbie here - related to your very last post. Can someone explain why this method works? I also find that I can reach the pfsense admin webapp on the alias IP itself, ie. in GlennNZ's example it would be 192.168.3.200. Is that an unintentional side effect? Do I want it? Maybe or maybe not.
thank you
-
@gurpal2000 does this still work? I tried some variations on this theme and none worked. I could never get the alias to stick on the WAN. But if I read the intent correctly, the NAT is taking 192.168.3/24 and translating it to 192.168.3.100/32. So maybe any address in 192.168.3/24 will translate to 192.168.3.100. I eventually had to go with a static assignment to the WAN to get to modem GUI along with a slightly different static NAT. So that needs to flop back and forth between DHCP and STATIC depending on whether you need internet of access to the GUI. OK for debugging I suppose - and what its typically needed for.