Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Insert SG-1100 between existing cable modem and router

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    50 Posts 5 Posters 10.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      Essentially yes. In bridge mode, your cable-modem simply acts as a dumb conduit to your ISPs network.

      N 1 Reply Last reply Reply Quote 0
      • N
        NGUSER6947 @KOM
        last edited by

        @KOM Thanks. Is there a particular "mode" I need to configure in the SG-1100 so that all it does is pass data between the modem and my router (other than with the added functionality of the Firewall)?

        Perhaps I'm making more of this than I need to.

        1 Reply Last reply Reply Quote 0
        • KOMK
          KOM
          last edited by

          The SG is already configured to route your traffic from WAN to LAN, if that's what you mean. There is no 'mode' to worry about.

          1 Reply Last reply Reply Quote 0
          • N
            NGUSER6947
            last edited by NGUSER6947

            Having problems making this work.

            I followed the instructions to start up the SG-1100. I then went into the setup wizard and walked through it.

            With a laptop plugged into the SG's LAN port, I can browse the internet so that tells me that the LAN port is getting out. The SG has a LAN IP of 192.168.1.1.

            When I unhook the cable from the laptop and plug in the cable going to my wifi router (Ubiquity AirRouter), I get no connectivity downstream (even after restarting the router numerous times).

            If I open a browser (on a PC on the LAN) and browse to 192.168.1.1, I get the AirRouter's configuration screen rather than the SG's setup screen. So there is an address conflict. And of course I can ping that address from the LAN.

            I went back into the SG and set it's address to 192.168.1.2, thinking that would solve the problem, but no luck. From a LAN pc, I cannot browse to 192.168.1.2. If I ping it, I get a reply from 192.168.1.200 that the destination is unreachable. Not sure where that is coming from.

            I did add 2 firewall rules to pass all TCP and UDP traffic; those rules sit below the built-in rules.

            I am not sure exactly what to try next. Appreciate any help! Thanks.

            1 Reply Last reply Reply Quote 0
            • KOMK
              KOM
              last edited by KOM

              There are several ways you could address this. For instance, you could give your laptop a static IP address of 192.168.1.2, 255.255.255.0 mask, no gateway and then connect your LAN port directly to the AP and then try to hit its web interface at 192.168.1.1.

              Or you could unplug the AP and then get to pfSense WebGUI and change its LAN IP address and mask to 192.168.2.1, /16 mask. Also change your mask to 255.255.0.0. Then plug in the AP and hit its web interface.

              Once you get to its interface, see if you can change its mode from the static 192.168.1.1 to DHCP. If not, then change it to 192.168.1.2. Turn off its DHCP server if one is enabled. You just want it to act as a bridge to LAN, and let pfSense handle giving out addreses. Make sure you have the DHCP server running on LAN and configured or your wifi devices won't get an address.

              Once you have changed it, go back and restore your pfSense LAN settings to their original 192.168.1.1/24.

              N 1 Reply Last reply Reply Quote 0
              • N
                NGUSER6947 @KOM
                last edited by

                Good progress but not quite there.

                I have my AP set up as a Bridge. SG gives each device (both wired and wireless) IP addresses via DHCP. I can ping any other device from any device, on the LAN. But nothing gets out to the internet (or back).

                In the SG my Dashboard shows all green up arrows for everything, except OPT which I haven't done anything with.

                In the Firewall, I added 4 rules: tcp and udp "pass" for both ip4 and ip6. They are green-checked. They are below the built-in rfc 1918 and reserved rules.

                I suspect I have a something blocking traffic but not sure what.

                1 Reply Last reply Reply Quote 0
                • N
                  NGUSER6947
                  last edited by

                  Success! I realized I needed to create Firewall rules to allow tcp and udp on the LAN side.

                  Appreciate all your help #KOM! Very grateful.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz

                    @NGUSER6947 said in Insert SG-1100 between existing cable modem and router:

                    I needed to create Firewall rules to allow tcp and udp on the LAN side.

                    No if its the default lan it would be any any rule out of the box.. You only need to create rules on new interfaces/vlans OPTX, the out of the box lan defaults to any any rule.

                    In the Firewall, I added 4 rules: tcp and udp "pass" for both ip4 and ip6.

                    You didn't create rules on your WAN did you?

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • KOMK
                      KOM
                      last edited by

                      Please post screens of your WAN, LAN and OPT1 rules so we can check them out for you.

                      N 1 Reply Last reply Reply Quote 0
                      • N
                        NGUSER6947 @KOM
                        last edited by

                        Ok.
                        Wan:
                        b511e418-3f62-494c-a6c9-5020a21f3726-image.png

                        Lan:
                        2ae89166-a80a-456d-9e20-836bbcbd25c8-image.png

                        I realize this probably isn't "firewalling" much of anything right now. My plan was to get everything on my network operating then research how to set up the best rules and lock the device down.

                        1 Reply Last reply Reply Quote 0
                        • KOMK
                          KOM
                          last edited by

                          Rules are evaluated top-down, first match wins. No other rules are processed after a hit.

                          On your WAN, get rid of those last four allow rules.

                          On your LAN, also get rid of those last 4 rules. The second rule is already passing all IP4 traffic. Those other rules you added aren't really doing anything. If you're not using IP6 then go to System - Advanced - Networking and disable IP6 there.

                          1 Reply Last reply Reply Quote 0
                          • N
                            NGUSER6947
                            last edited by

                            Ok done. And, everything still works. Thanks folks for the help.

                            1 Reply Last reply Reply Quote 0
                            • KOMK
                              KOM
                              last edited by

                              https://docs.netgate.com/pfsense/en/latest/firewall/firewall-rule-basics.html

                              1 Reply Last reply Reply Quote 0
                              • KOMK
                                KOM
                                last edited by

                                If you do disable IP6, don't forget to go back to your LAN rules and delete the IP6 ones you manually added.

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by

                                  There you go - much better ;)

                                  See no need to have created any rules..

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  N 1 Reply Last reply Reply Quote 0
                                  • N
                                    NGUSER6947 @johnpoz
                                    last edited by

                                    Thank you both.

                                    So with the "factory" rules (only) in place, am I better protected than without the SG, or not really until I start creating more specific rules?

                                    1 Reply Last reply Reply Quote 0
                                    • KOMK
                                      KOM
                                      last edited by

                                      Yes. Default rules allow all traffic out from LAN, and block all unsolicited traffic in to WAN.

                                      1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator
                                        last edited by johnpoz

                                        depends - with the default rules nothing has been forwarded from wan/internet to your behind pfsense router that is for sure.

                                        Not sure why you want or think you need another router behind pfsense.. If you want wireless - then just use an AP.

                                        edit
                                        What is this exactly "Ubiquiti wife router." Do you mean an AP like an AC-Pro or -Lite? What is the model number of this device? you have from unifi?

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        N CourierdogC 2 Replies Last reply Reply Quote 0
                                        • N
                                          NGUSER6947 @johnpoz
                                          last edited by

                                          @johnpoz. It is an AirRouter. I have it set up in bridge mode. Although most of my gear is hard-cabled, I have a couple of devices I can only get to via wifi.

                                          1 Reply Last reply Reply Quote 0
                                          • CourierdogC
                                            Courierdog @johnpoz
                                            last edited by

                                            @johnpoz Courierdog here and I have a similar requirement.
                                            My ISP provides the Fibre ONT (Modem) to their ISP Router.
                                            The ISP Router also provides the IP TV and the ISP provided Home Security System
                                            From the ISP Router I feed a Bitdefender Box 2 (WiFi Router)
                                            The Netgate SG-1100 does not have WiFi
                                            I would like to configure the SG-1100 so all the ethernet LAN connections pass through the SG-1100 which then connects to the Home Network Switch.
                                            The ISP Router provide the Internet connection
                                            The Bitdefender Box 2 provides the monitored WiFi Access Point
                                            The Netgate SG-1100 provides the Firewall for the Home Ethernet network
                                            I have in the past used a Router with Tomato Firmware whereI now want to place the Netgate SG-1100
                                            I configured the Tomato Router as a static IP addressed Bridge using one address within the range of the Bitdefender Box 2 DHCP range of addresses.
                                            I am unsure if the Netgate SG-1100 can be configured this way or would it have to be placed in front of the Access Point which would have to be configured as the Bridge.
                                            Thanks in advance

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.