Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ATT Uverse RG Bypass (0.2 BTC)

    Scheduled Pinned Locked Moved Bounties
    555 Posts 80 Posters 1.2m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      Manual edits outside the GUI are not supported. You can edit what is there if there is a supported configuration, but adding something like earlyshellcmd without the shell command package installed is just asking for trouble. Best to use the gui.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • B
        bulldog5
        last edited by

        I did/do have the shell command pkg installed, same treatment.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          That makes no sense. You'll have to post more details. Use the shell command package to make the entry and you will be fine.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          B 1 Reply Last reply Reply Quote 0
          • B
            bulldog5 @Derelict
            last edited by bulldog5

            @Derelict said in ATT Uverse RG Bypass (0.2 BTC):

            That makes no sense. You'll have to post more details. Use the shell command package to make the entry and you will be fine.

            but adding something like earlyshellcmd without the shell command package installed is just asking for trouble. Best to use the gui.

            I read this as -- if i have the shell command package installed, i can use the <earlyshellcmd> in the config.xml. which is what I did. that still gets eliminated from the config.xml on reboot.

            I will use the shell cmd package. Directions for the pfatt script might need to be updated then.

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by Derelict

              Yes, that was bad advice. The internet is full of it.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • T
                t41k2m3
                last edited by

                shellcmd package is easiest option here.

                that said, even the pfSense book suggests hand editing config.xml in certain situations:
                https://docs.netgate.com/pfsense/en/latest/book/bridging/bridging-and-interfaces.html#quickest-but-most-difficult-hand-edit-config-xml

                is that bad advice? beyond @bulldog5 's issue, this is jusr an educational question about how config.xml is handled at boot time rather than whether hand editing it is advisable, supported or safe to do.

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  It is fine if you are manually changing the configuration instead of using the GUI for something that has a GUI field. The system does not know the difference when you restore the configuration.

                  But you should use the GUI to initially establish the necessary XML. In the instant case, that involves installing the shellcmd package.

                  For instance, if you are migrating a configuration from a system with em NICs to one with igb NICs it is perfectly acceptable to download the configuration, edit it to change the physical NIC names, and restore it to the new unit.

                  But don't expect just any manual edit to survive.

                  In other words, changing values in existing XML tags works (as long as your changes are sane) but you have to know exactly what you are doing if you choose to add your own tags from nothing.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • T
                    t41k2m3
                    last edited by

                    Thanks for elaborating @Derelict, makes sense. Just speculating along those lines, as it sounded like he was using both the gui (via shellcmd pkg) and manually editing the <earlyshellcmd> section -- that may be why manual edits were lost at boot (gui superseded them).

                    B 1 Reply Last reply Reply Quote 0
                    • B
                      bulldog5 @t41k2m3
                      last edited by

                      Thanks for clearing it up.

                      1 Reply Last reply Reply Quote 0
                      • J
                        jasonsansone
                        last edited by

                        Has anyone attempted (or ideally achieved) a bypass of the AT&T ONT? I am successfully bypassing the Residential Gateway, but I was curious about taking the fiber directly in to an SFP or SFP+ NIC. Latency should be superior by avoiding the media conversion to copper. The same NIC could then connect to a switch via fiber on a different port.

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          Makaveli6103 @jasonsansone
                          last edited by

                          @jasonsansone you should look at pfatt method to bypass. I use to to plug my ONT directly into my pfsense router. https://github.com/aus/pfatt

                          J 1 Reply Last reply Reply Quote 0
                          • J
                            jasonsansone @Makaveli6103
                            last edited by

                            @Makaveli6103 thank you, but you misunderstand my inquiry. I am using pfatt. The ONT connects via Cat6 into the NIC in my pfSense installation. I want to bypass the ONT so that the fiber line goes directly in to pfSense without the media conversion from fiber to copper.

                            G 1 Reply Last reply Reply Quote 0
                            • G
                              gfeiner @jasonsansone
                              last edited by

                              @jasonsansone
                              not possible. It's the ONT that sets your line rate so you better believe there is security in it else anyone could just bypass it and get full gig.

                              1 Reply Last reply Reply Quote 1
                              • J
                                jasonsansone
                                last edited by

                                Ya, after more thought and research I realized that being the DMARC, I shouldn’t screw with it. Thank you.

                                1 Reply Last reply Reply Quote 0
                                • A
                                  AiC0315
                                  last edited by

                                  I'm able to get this working in bridge mode but when I try it in supplicant mode, the boot up looks like this.

                                  code_text
                                  Loading configuration......done.
                                  pfatt: starting pfatt...
                                  pfatt: configuration:
                                  pfatt:   ONT_IF = em0
                                  pfatt:   RG_ETHER_ADDR = xx:xx:xx:xx:xx:xx
                                  pfatt:   EAP_MODE = supplicant
                                  pfatt:   EAP_SUPPLICANT_IDENTITY = xx:xx:xx:xx:xx:xx
                                  pfatt:   EAP_BRIDGE_IF = em1
                                  pfatt:   EAP_BRIDGE_5268AC = 0
                                  pfatt: resetting netgraph...
                                  pfatt: configuring EAP environment for supplicant mode...
                                  pfatt: cabling should look like this:
                                  pfatt:   ONT---[] [em0]
                                  pfatt: creating vlan node and ngeth0 interface...
                                  ngeth0: link state changed to UP
                                  pfatt: enabling promisc for em0...
                                  em0: permanently promiscuous mode enabled
                                  pfatt: starting wpa_supplicant...
                                  pfatt: wpa_supplicant running on PID 453...
                                  pfatt: setting wpa_supplicant network configuration...
                                  pfatt: waitng EAP for authorization...
                                  em0: link state changed to UP
                                  

                                  code_text

                                  Then it just sits there. I have the certs in /conf/pfatt/wpa and the MAC address is correct.
                                  Any ideas of what might be wrong?

                                  Thanks!

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    AiC0315
                                    last edited by

                                    Figured out the problem. The code is looking for:

                                    ca.pem
                                    client.pem
                                    private.pem

                                    My .pem files where named differently. Once I changed them I got supplicant mode working. One odd thing I noticed, download speeds are 500-600 while upload speeds are 920-940..

                                    P 1 Reply Last reply Reply Quote 0
                                    • P
                                      phatty @AiC0315
                                      last edited by phatty

                                      So I am not having luck. I have tried in both the dumb switch, bridge mode way and using the pfatt.sh add-on. On first bootup I never got prompted to adjust interfaces, but in the web GUI I was able to select the ngeth0 interface for my WAN.

                                      DHCP never pulls down an IP and just displays 0.0.0.0. This is the same thing that happened when I tried it in dumb switch bridge mode.

                                      Right now the connection from AT&T is directly plugged into igb4 and igb3 is plugged directly into my BGW210.

                                      When I had tested dumb switch bridge mode I had tested with AT&T line going through my switch then to modem, all worked, but then unplugging mode and spoofing mac never seemed to work. Any ideas? We are a small office, but no way the 8k session limitation is doable for us so I must have a work around or we will end up paying the ETF and cancelling services.

                                      Some info from my config.
                                      There are 11 total nodes:
                                      Name: igb0_366 Type: ether ID: 00000024 Num hooks: 0
                                      Name: igb3 Type: ether ID: 00000004 Num hooks: 2
                                      Name: snmpd Type: socket ID: 00000025 Num hooks: 0
                                      Name: igb4 Type: ether ID: 00000005 Num hooks: 1
                                      Name: <unnamed> Type: socket ID: 00000009 Num hooks: 0
                                      Name: o2m Type: one2many ID: 0000000e Num hooks: 3
                                      Name: vlan0 Type: vlan ID: 00000011 Num hooks: 2
                                      Name: ngeth0 Type: eiface ID: 00000014 Num hooks: 1
                                      Name: waneapfilter Type: etf ID: 00000018 Num hooks: 2
                                      Name: ngctl25340 Type: socket ID: 0000003a Num hooks: 0
                                      Name: eapfiltlaner Type: etf ID: 0000001c Num hooks: 3

                                      Log file
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: Configuration:
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: ONT_IF: igb4
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: RG_IF: igb3
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: RG_ETHER_ADDR: xxxxx
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: OPNSENSE: no
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: loading netgraph kernel modules... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: attaching interfaces to ng_ether... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: building netgraph nodes...
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: creating ng_one2many... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: creating vlan node and interface... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: defining etf for igb4 (ONT)... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: defining etf for igb3 (RG)... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: bridging etf for igb4 <-> igb3... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: defining filters for EAP traffic... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: enabling one2many links... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: removing waneapfilter:nomatch hook... OK!
                                      2019-10-16 13:19:45 :: [pfatt.sh] :: enabling igb3 interface... OK!
                                      2019-10-16 13:19:46 :: [pfatt.sh] :: enabling igb4 interface... OK!
                                      2019-10-16 13:19:46 :: [pfatt.sh] :: enabling promiscuous mode on igb3... OK!
                                      2019-10-16 13:19:46 :: [pfatt.sh] :: enabling promiscuous mode on igb4... OK!
                                      2019-10-16 13:19:46 :: [pfatt.sh] :: ngeth0 should now be available to configure as your pfSense WAN
                                      2019-10-16 13:19:46 :: [pfatt.sh] :: done!
                                      2019-10-16 13:39:46 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode

                                      A 1 Reply Last reply Reply Quote 0
                                      • A
                                        AiC0315 @phatty
                                        last edited by

                                        @phatty which method are you using to get the above log file?

                                        P 1 Reply Last reply Reply Quote 0
                                        • P
                                          phatty
                                          last edited by

                                          Log is from pfatt.log, only thing I tweaked in the config for that was adding igb interface info and Mac. Then on first bootup I changed my wan interface to use the ngeth

                                          J 1 Reply Last reply Reply Quote 0
                                          • J
                                            JonH @phatty
                                            last edited by

                                            @phatty The instructions are very good, I'd check the instructions again step-by-step.
                                            FWIW, I set pfatt.sh aside several months ago after not finding significant performance enhancement and planned to return to it later for another try. During that time I have decided it may not be useful to me. As a home user and not running web services but with roughly 20 connections I do not readily fill up my BGW's nat table. In fact, since early August I have hardly made an impact on that table. Unless I'm missing some other useful functionality it appears that I can get along fine without pfatt.

                                            Also I had hoped it would improve my throughput since the default install is double NAT but after a number of speed tests with and w/o pfatt active I see an insignificant difference. That said, if I updated my hardware I might find different results and I am considering getting a newer Netgate appliance and a managed switch. Currently I am running pfSense on a netgate sg-2440 and have a dumb switch behind it.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.