Minimum hardware to do symmetric gigabit wan + pass 802.1x traffic to AT&T?
-
What kind of gateway you have there from AT&T? (Vendor/model/model number)
They gave me a Pace 5268AC-FXN. It looks identical to the Arris one, but I'm not sure if there are any underlying differences.
Could also be nice, but please be ensure that it is coming together with AES-NI inside!
I ended up going with a modern Celeron G3930, which has AES-NI. Right now it's connected behind that Pace box, so still double-nat, and getting ~600MBps both ways. Once I get some time to tinker, I will try bypassing the Pace box with that "forward the auth packets" hack, and connecting directly to the optical linkup.
I'm actually not 100% sure of the best way to apply that using pfSense, since the articles I found are for various linux-based routers. I'm sure with enough tinkering I can figure it out, but if anyone has any tips, I'd be happy to hear them.
-
All of the "solutions" to bypass att gateways are pretty hacky at best. Nothing is clean and/or reliable.
Honestly, if you set it.up right you don't double Nat, you get the wan IP to pfSense.
Unless you're actually hitting the limit of the gateways may table and it is causing you noticeable problems, there is no advantage to bypassing it. There are however quite a few disadvantages to the hacky bypassing solutions currently known.
-
Not pretty actual, but able to march without any dumping, magic in the middle and so on!
Would be my 1st choiceI ended up going with a modern Celeron G3930, which has AES-NI. Right now it's connected behind that Pace box, so still double-nat, and getting ~600MBps both ways. Once I get some time to tinker, I will try bypassing the Pace box with that "forward the auth packets" hack, and connecting directly to the optical linkup.
Up link and magic in the middle would be not my way.
I'm actually not 100% sure of the best way to apply that using pfSense, since the articles I found are for various linux-based routers. I'm sure with enough tinkering I can figure it out, but if anyone has any tips, I'd be happy to hear them.
In my eyes it might be a good sounding method to call the AT&T support and ask for another device that brings you
into the situation that you could set up your own device. Larger companies are surely not using that devices and
had also to set up their equipment working fine. Its a try out, but perhaps there is something able to realize. -
My fiber connection doesn't use PPPoE, or if it does, it's all encapsulated into the AT&T "router-gateway" device that they gave me, such that I cannot have pfSense doing the authentication, and still need to use their provided box, at least to authenticate.
My understanding is that it uses some sort of certificate-based authentication, but one thing is for sure: If you plug directly into the ethernet jack on the optical network terminal, you don't get internet.
To bypass the "router-gateway", I need 3 ethernet jacks for: LAN, WAN (from the ONT), and a 3rd that is bridged with the WAN port, to let the "router-gateway" still exchange 802.1x traffic with AT&T so that they know I'm a legit subscriber and let me on the network.
My main concern is that this "bridging" is going to require better hardware, since it will then be having to decide what traffic goes where.
You're right, AT&T uses 802.1X authentication, not PPPoE. Even DSL now uses 802.1X, locking users into the awful CPE that AT&T provides. I think the workaround you're after only applies to fiber connections, but that's something.
-
The Celeron box I built originally wasn't powerful enough to do full gigabit WAN, and was topping out around 600mbps, so I picked up a Dell PowerEdge T30 on sale at $329USD using coupon 329#T30 (might still work – go grab one while you can!) This new box sports an Intel Xeon E3-1225 @ 3.3GHz, with a Passmark score of 7783, whereas that Celeron G3930 scored only 3044.
I followed you guys' suggestions and just set everything up in "DMZ+" mode. There's still an extra unnecessary hop through the AT&T router-gateway, but at least now I can use UPNP with decent speeds and ping. I will probably get bored one day and try bypassing the RG box just for fun, but for now I'm very happy with my connection, and even happier to be back on pfSense!
Relevant links:
https://www.dealnews.com/Dell-Power-Edge-T30-Xeon-Quad-Tower-Server-for-329-free-shipping/2107012.html
http://www.dell.com/en-us/work/shop/dell-poweredge-servers/poweredge-t30-mini-tower-server/spd/poweredge-t30/pet30_12084_3 -
The Celeron box I built originally wasn't powerful enough to do full gigabit WAN, and was topping out around 600mbps, so I picked up a Dell PowerEdge T30 on sale at $329USD using coupon 329#T30 (might still work – go grab one while you can!) This new box sports an Intel Xeon E3-1225 @ 3.3GHz, with a Passmark score of 7783, whereas that Celeron G3930 scored only 3044.
I followed you guys' suggestions and just set everything up in "DMZ+" mode. There's still an extra unnecessary hop through the AT&T router-gateway, but at least now I can use UPNP with decent speeds and ping. I will probably get bored one day and try bypassing the RG box just for fun, but for now I'm very happy with my connection, and even happier to be back on pfSense!
Relevant links:
https://www.dealnews.com/Dell-Power-Edge-T30-Xeon-Quad-Tower-Server-for-329-free-shipping/2107012.html
http://www.dell.com/en-us/work/shop/dell-poweredge-servers/poweredge-t30-mini-tower-server/spd/poweredge-t30/pet30_12084_3This is good to know! So you’re basically saying all you did is to put your new box in the Gateway’s DMZ, and you were good to go? No extra setup? What version of pfSense are you running?
-
I get 1gb/1gb from wan to lan on ATT network which is bridged not routed. CPU barely breaks a sweat.
Intel(R) Core(TM)2 Duo CPU E7500 @ 2.93GHz
2 CPUs: 1 package(s) x 2 core(s)
AES-NI CPU Crypto: NoIts really doesn't take that much. Just be sure your NICs are sitting in pcie ports.
The AES-NI functions matter alot when handling VPN traffic. I have never, not once ever hit a bottleneck due to lack of AES-NI on a system, but you would if you had two networks in the same city or state and were passing traffic over vpn between pfsense and a very fast computer if both ends were capable of gigabit speeds. Per core performance is what matters most.
Otherwise latency and bandwidth availability are more likely to limit your throughput than lack of AES-NI
AES-NI won't do jack to help with WAN to LAN performance for most traffic. Just the encrypted stuff.This crazy awesome state of the art rig cost $75 on newegg. Off-lease. Refurbished. I forget…
I am a fan of AES-NI, but having AES-NI doesn't mean you will have fast Lan to Wan performance. To ensure that, make sure your CPU features good old fashioned speed.
passmark benchmark for the E3-1225 mentioned above this comment is 5954. Thats why he gets good throughput. It can probably go alot faster than 1gb/1gb.
Note the single thread rating: Single Thread Rating: 1747passmark on the E7500 I'm running in Florida is only 1876 and handles gigabit traffic with ease.
Single Thread rating: Single Thread Rating: 1204A dual core machine with a very high single thread rating will likely outperform a 4 core or 8 core machine with a higher over all benchmark but lower per thread ratings in most cases.
Using that logic, I went here https://www.cpubenchmark.net/singleThread.html
Sorted by single thread performance on chips that also support AES-NI. The Intel Core i3-7350K Kaby Lake Dual-Core 4.2 GHz immediately stands out as dirt cheap and wicked fast.
-
So you’re basically saying all you did is to put your new box in the Gateway’s DMZ, and you were good to go? No extra setup?
Basically, yeah. I actually have static IPs, so I just went into the AT&T router setup and told it to give my pfSense box a static IP, and selected Firewall: Disabled, which automatically puts it in "DMZ+" mode.
The only weird thing I had to do was to set it up the LAN on 192.168.2.x (instead of the default 192.168.1.x). For some reason (I think because AT&T's device uses the 192.168.1.x range by default) I couldn't ping the pfSense box on the LAN (even thought I got an IP from DHCP). Another valid solution could have been to put AT&T's device on 192.168.0.x, but I foresaw this eventually confusing their support techs, and/or giving them a reason not to assist me.What version of pfSense are you running?
2.4.0-RELEASE (amd64)
I get 1gb/1gb from wan to lan on ATT network which is bridged not routed. CPU barely breaks a sweat.
Are you on fiber-to-the-home by chance? If so, did you use the "pass the authentication over a bridge" hack described here: https://strscrm.io/bypassing-gigapowers-provided-modem.html?
A dual core machine with a very high single thread rating will likely outperform a 4 core or 8 core machine with a higher over all benchmark but lower per thread ratings in most cases.
…
passmark on the E7500 I'm running in Florida is only 1876 and handles gigabit traffic with ease.
Single Thread rating: Single Thread Rating: 1204Now I'm wondering why that Celeron box I built didn't perform despite having a single-thread rating of 1659. Maybe I was just testing it at a bad time, or against a slow/distant speedtest server. Who knows…
In the end it all works out though: My parents will get a new Windows PC, and I'll probably end up virtualizing this Xeon box and consolidating several other power sucking devices into one.
-
So you’re basically saying all you did is to put your new box in the Gateway’s DMZ, and you were good to go? No extra setup?
Basically, yeah. I actually have static IPs, so I just went into the AT&T router setup and told it to give my pfSense box a static IP, and selected Firewall: Disabled, which automatically puts it in "DMZ+" mode.
The only weird thing I had to do was to set it up the LAN on 192.168.2.x (instead of the default 192.168.1.x). For some reason (I think because AT&T's device uses the 192.168.1.x range by default) I couldn't ping the pfSense box on the LAN (even thought I got an IP from DHCP). Another valid solution could have been to put AT&T's device on 192.168.0.x, but I foresaw this eventually confusing their support techs, and/or giving them a reason not to assist me.What version of pfSense are you running?
2.4.0-RELEASE (amd64)
I get 1gb/1gb from wan to lan on ATT network which is bridged not routed. CPU barely breaks a sweat.
Are you on fiber-to-the-home by chance? If so, did you use the "pass the authentication over a bridge" hack described here: https://strscrm.io/bypassing-gigapowers-provided-modem.html?
A dual core machine with a very high single thread rating will likely outperform a 4 core or 8 core machine with a higher over all benchmark but lower per thread ratings in most cases.
…
passmark on the E7500 I'm running in Florida is only 1876 and handles gigabit traffic with ease.
Single Thread rating: Single Thread Rating: 1204Now I'm wondering why that Celeron box I built didn't perform despite having a single-thread rating of 1659. Maybe I was just testing it at a bad time, or against a slow/distant speedtest server. Who knows…
In the end it all works out though: My parents will get a new Windows PC, and I'll probably end up virtualizing this Xeon box and consolidating several other power sucking devices into one.
You mentioned having static IPs, did you purchase those from ATT?
-
You can purchase static IPs from att, but you don't have to.
I have my att ftth gateway set in IP passthrough with all firewalling "features" turned off and did not purchase any static IPs. pfSense gets WAN address and functions just as it did with a cable modem. The only difference is one extra hop because of the gateway and latency and throughput is far better and more consistent than I've ever seen across multiple cable providers in multiple states.
So far even though I have a dynamic IP, it hasn't changed. If it's anything like my previous cable providers it won't change for a very long time (> 1 year). But we will see.
-
You can purchase static IPs from att, but you don't have to.
I have my att ftth gateway set in IP passthrough with all firewalling "features" turned off and did not purchase any static IPs. pfSense gets WAN address and functions just as it did with a cable modem. The only difference is one extra hop because of the gateway and latency and throughput is far better and more consistent than I've ever seen across multiple cable providers in multiple states.
So far even though I have a dynamic IP, it hasn't changed. If it's anything like my previous cable providers it won't change for a very long time (> 1 year). But we will see.
Gotcha. I’m about to have my choice of Gigabit Ethernet via Suddenlink (cable) or ATT (fiber). I’m unsure which to go with. If I pick Suddenlink, I can use my own modem and I feel use my pfSense box to its fullest potential.
If I pick ATT, I have to use their Gateway, and stick my pfSense box behind it. I am unsure if that’s the best way to get the fastest speeds or use my pfSense box to its fullest postential.
Any thoughts? I’ve heard nothing but horror stories from folks using the ATT Gateways along with their own router behind it. I’ve heard to limits what you can do with pfSense as well.
Dunno if that’s true.
-
I have the Pace modem with Gigapower, and I haven't had any issues using routers or anything else behind it. You just have to make sure you have a set of static IPs, and then assign one to the WAN interface. Unless your a large company or have hundreds of users, there is zero chance you max out the 8-9k NAT table on the gateway they give you.
The one thing I did change is run all of my consoles and even my PC though a router that I dont have doing IPv6, because they tunnel their 6 and it adds significant latency, which i dont like.
-
Again, you do not need to purchase static IPs with att ftth.
None of the gateways have true bridge mode, all of the gateways have some form of half measure that provides pfSense with a public IP. This will be called something along the lines of DMZ+ or ip-passthrough. It doesn't matter to you which mode you get.
What does matter as far as which gateway you get is the NAT table size. Some of the older gateways had much smaller NAT tables, like 2k. The newer gateways are 8k+. You should get a new gateway if you are a new customer.
All gateways, regardless of model or method to get pfSense a public IP will force you to use the gateways NAT table (even though you aren't double NAT), so having that larger NAT table matters.I would recommend you purchase your plan and schedule your installation, tell them you only want a new model with large NAT table.
After the installation is scheduled, login to your account and start an online chat. Tell them your account number and installation confirmation number. Then ask them what model of gateway will be installed. Google that model, if it has a large NAT table then just save the chat transcript.When your installer arrives, BEFORE they do Anything ask to see the gateway that will be installed. Google that model number if it's different than what they promised, if it's also a Large NAT table then you're good. If it is a smaller NAT table, stop the install before it starts, reference your saved chat transcript and tell them you'll only accept the service with a new model that has a large table.
Again, I don't think they even distribute the smaller NAT table models to new customers so it should be a non issue, but better safe than sorry.
Just to reiterate, you don't need to purchase ANY additional services from ATT to get it to work properly without double NAT on pfSense.
The NAT table size, as has already been stated is only an issue for medium to large networks. Your home network, even if relatively large and complex will almost certainly not exhaust that table.
For medium to large networks, or with the older gateways with small NAT tables it is a very real problem. That's why you find all the crazy hacks on how to bypass the gateway. -
Correct. When I was setting this up for the single pfsense I have up on an ATT fiber connection I was assured that a good bridged mode where you get a public IP at the pfsense wan was impossible.
It was very easy and straight forward. The only side effect, which for some may be a deal breaker, is that IPV6 is not convenient to work out because of the way they pass in their tunnels and authenticate it on the modem. I just pass bridged IPV4 and turned off IPV6 at the wan. I have no use for a /64 on my freakin wan.
-
Got it. Thanks everyone!!
-
For the:
Intel(R) Core(TM)2 Duo CPU E7500 @ 2.93GHz
2 CPUs: 1 package(s) x 2 core(s)
AES-NI CPU Crypto: NoSpeedtest results vary depending on network conditions. Speedtest.net is highly variable and the comcast test is very consistent.
http://speedtest.xfinity.com/results/J98EWA1V1ACVMR0
http://www.speedtest.net/my-result/6738848123
-
None of the gateways have true bridge mode, all of the gateways have some form of half measure that provides pfSense with a public IP. This will be called something along the lines of DMZ+ or ip-passthrough. It doesn't matter to you which mode you get.
What does matter as far as which gateway you get is the NAT table size. Some of the older gateways had much smaller NAT tables, like 2k. The newer gateways are 8k+. You should get a new gateway if you are a new customer.
All gateways, regardless of model or method to get pfSense a public IP will force you to use the gateways NAT table (even though you aren't double NAT), so having that larger NAT table matters.This is 100% correct. Personally, I have the 5268AC passing through the public IP to pfSense with no issues in the 9 months or so I've had it. But I'm on VDSL. The DMZ+ mode also works fine with fiber, but the OP is looking at a workaround that is only available with fiber. It's not a true bridge mode, but it allows the AT&T CPE to handle the 802.1x auth without having to worry about the state table in the AT&T hardware. At least that's how I understand it.
That clarification aside, the hardware required on the pfSense end won't be any different than for any other 1Gbps WAN.
-
Wouldn't it be easier to just get the 802.1x details and auth directly.
-
@johnkeates:
Wouldn't it be easier to just get the 802.1x details and auth directly.
I believe it uses a certificate that is locked to the CPE.
-
Seriously surprised this DSLReports thread isn't mentioned here.. (or did I miss it?)
http://www.dslreports.com/forum/r29903721-AT-T-Residential-Gateway-Bypass-True-bridge-mode