Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cope bad peering of ISP Deutsche Telekom

    Scheduled Pinned Locked Moved General pfSense Questions
    16 Posts 5 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Bob.DigB
      Bob.Dig LAYER 8
      last edited by Bob.Dig

      Network noob here,

      as discussed here, five days ago I got me a new ISP (Deutsche Telekom). This ISP does really bad peering and that makes problems, for instance with downloading the snort-subscriber rules, the download never finishes. Maybe pfBlocker feeds are also affected, can't tell.
      I can use a VPN to circumvent that behavior for my daily browsing routines and I already used one before with pfSense, but what I don't want to do is making the vpn the default gateway of pfSense.

      @DaddyGo and others.
      So how can I solve this just for pfSense itself (Suricata Snort-rules), without using a vpn as the default gateway. Maybe with static routes or NAT on the WAN-interface? Any in-depth help would be appreciated. I don't know much about NAT and did policy routing only on LAN before.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • RicoR
        Rico LAYER 8 Rebel Alliance
        last edited by

        MTU issue?
        Test download URL? I have access to ~30 Sites with Deutsche Telekom to check.

        -Rico

        Bob.DigB 1 Reply Last reply Reply Quote 0
        • Bob.DigB
          Bob.Dig LAYER 8 @Rico
          last edited by Bob.Dig

          @rico said in Cope bad peering of ISP Deutsche Telekom:

          MTU issue?
          Test download URL? I have access to ~30 Sites with Deutsche Telekom to check.

          So I noticed it myself with the snort subscriber rules, you can test this yourself, if you have a snort account (for example snortrules-snapshot-29161.tar.gz).
          I also have found problems with a small tool (500KB) hosted on AWS, but right now I can download it fast so sharing the url doesn't make sense. Yesterday evening the download coudn't finish at all.

          Also what I noticed since having the new ISP, the thinkbroadband quality monitor is showing much blue for 12 hours.

          uk peering.png

          DaddyGoD 1 Reply Last reply Reply Quote 0
          • DaddyGoD
            DaddyGo @Bob.Dig
            last edited by

            @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

            you can test this yourself, if you have a snort account (for example snortrules-snapshot-29161.tar.gz).

            This is clearly a problem....

            what does a traceroute point to snort.org?

            there is no problem for us with this, I just tried:
            f1d9a0fb-d14f-4c54-a401-a10c4048af2a-image.png

            have you tried this?
            https://kb.netgear.com/19863/Ping-Test-to-determine-Optimal-MTU-Size-on-Router

            Cats bury it so they can't see it!
            (You know what I mean if you have a cat)

            Bob.DigB 1 Reply Last reply Reply Quote 1
            • Bob.DigB
              Bob.Dig LAYER 8 @DaddyGo
              last edited by Bob.Dig

              @daddygo said in Cope bad peering of ISP Deutsche Telekom:

              what does a traceroute point to snort.org?

              Shows not much I think, but dl speed defers drastically


              Capturex.PNG

              old isp dl.PNG

              tracert.PNG

              @daddygo said in Cope bad peering of ISP Deutsche Telekom:

              have you tried this?
              https://kb.netgear.com/19863/Ping-Test-to-determine-Optimal-MTU-Size-on-Router

              No, because everything else is working as expected, it is a peering problem at least to AWS.

              So guys, what to do in practice?

              DaddyGoD 1 Reply Last reply Reply Quote 0
              • DaddyGoD
                DaddyGo @Bob.Dig
                last edited by

                @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

                So guys, what to do in practice?

                this will be hard to circumvent with NAT and things like that...

                as I understood the German articles on the theme...

                Deutsche Telekom is misbehaving with large network traffic suppliers "players" such as Hurrican Electric, AWS, etc.

                open a ticket with measurements evidence and if they can't help you will have a reason to get rid of it

                https://www.peeringdb.com/net/196

                Cats bury it so they can't see it!
                (You know what I mean if you have a cat)

                Bob.DigB 1 Reply Last reply Reply Quote 0
                • Bob.DigB
                  Bob.Dig LAYER 8 @DaddyGo
                  last edited by Bob.Dig

                  @daddygo said in Cope bad peering of ISP Deutsche Telekom:

                  this will be hard to circumvent with NAT and things like that...

                  Couldn't I use pfBlocker to create an alias for AWS and then selectively route this through a vpn (on WAN though) or create a static route for that somehow?

                  stephenw10S DaddyGoD 2 Replies Last reply Reply Quote 0
                  • JKnottJ
                    JKnott @Bob.Dig
                    last edited by

                    @bob-dig

                    What do you mean by "peering". That's where carriers and ISPs meet to exchange data. For example, my ISP peers at the Toronto Internet Exchange. You mention AWS, but unless they have a point of presence at the same location as your ISP, they're not peering.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    Bob.DigB 1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator @Bob.Dig
                      last edited by

                      You can try to do that. If you can make an alias of all of AWS you can static route it via a VPN gateway. That will apply all traffic including any client traffic not policy routed.

                      Steve

                      Bob.DigB 1 Reply Last reply Reply Quote 0
                      • DaddyGoD
                        DaddyGo @Bob.Dig
                        last edited by DaddyGo

                        @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

                        Couldn't I use pfBlocker to create an alias for AWS

                        but yes, you only have to do this with all the intermediate network players ๐Ÿ˜‰

                        it would be a horror job and you donโ€™t know when your packages will travel and which route

                        f.e.:
                        in the EU travels a lot of package on the HE network

                        BTW:
                        Telekom is also in a bad relationship with them

                        +++edit:
                        like you said you don't just notice this problem towards AWS....(?!)

                        Cats bury it so they can't see it!
                        (You know what I mean if you have a cat)

                        1 Reply Last reply Reply Quote 0
                        • Bob.DigB
                          Bob.Dig LAYER 8 @stephenw10
                          last edited by Bob.Dig

                          @stephenw10 said in Cope bad peering of ISP Deutsche Telekom:

                          You can try to do that. If you can make an alias of all of AWS you can static route it via a VPN gateway. That will apply all traffic including any client traffic not policy routed.

                          Steve

                          Thanks steve, but where to "put" it. It should be used at least by Suricata and pfBlocker.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Add is as a static route in Sys > Routing > Static Routes.

                            It might get ugly with an alias that tries to include all of AWS as that will be huge. Your routing table will end up.... large!

                            There is no way to policy route traffic from the firewall itself so it will apply to all traffic that isn't otherwise policy routed.

                            Steve

                            Bob.DigB 1 Reply Last reply Reply Quote 1
                            • Bob.DigB
                              Bob.Dig LAYER 8 @stephenw10
                              last edited by Bob.Dig

                              @stephenw10 I checked with a rule on lan, worked flawlessly with the snort rules download.

                              Capturexyz.PNG

                              That table I created has 2,055 records though...

                              How could I do that or at least test it on "wan"? Is it doable in the gui?
                              I can't load these pfBlocker Aliases under System/Routing/Static Routes.

                              @DaddyGo To be clear, I want to get rid of them asap, but I signed a two year contract...

                              Bob.DigB 1 Reply Last reply Reply Quote 0
                              • Bob.DigB
                                Bob.Dig LAYER 8 @Bob.Dig
                                last edited by Bob.Dig

                                @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

                                How could I do that or at least test it on "wan"? Is it doable in the gui?
                                I can't load these pfBlocker Aliases under System/Routing/Static Routes.

                                For the lols I guess, I tried this, but also wasn't working:

                                Captureabba.PNG

                                I do have a VPS though and routing it there seems to be a viable solution. But I have configured it to connect to me and not the other way around and I am somewhat noobish when it comes to my own OVPN-installations, so the firewall itself will be the last to have internet. ๐Ÿ™„

                                1 Reply Last reply Reply Quote 0
                                • Bob.DigB
                                  Bob.Dig LAYER 8 @JKnott
                                  last edited by

                                  @jknott said in Cope bad peering of ISP Deutsche Telekom:

                                  You mention AWS, but unless they have a point of presence at the same location as your ISP, they're not peering.

                                  Ok, then I meant routing because of bad peering or just bad routing in general. ๐Ÿ˜‰

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Yeah, it would need to actually route to it using a static route. Outbound NAT does not route traffic.

                                    You're right though, you can't use a URL alias in a static route. Which is reasonable since adding 2055 routes to the table would be.... ugly at best!

                                    Steve

                                    1 Reply Last reply Reply Quote 1
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.