Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    So what I would like to achieve is the following to allow monitoring…

    Scheduled Pinned Locked Moved General pfSense Questions
    24 Posts 4 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @JKnott
      last edited by johnpoz

      You have 3 freaking routers in this layout?? with only 4 vlans? Why??? so many??

      And 2 layer 3 - doing routing?? This makes zero sense at all..still have no idea what your trying to do other than use up equipment to do nothing.. You say layer 3 and mention them doing routing, but then you have the interfaces on pfsense labeled with the 4 vlans? I still don't know what your wanting to do..

      And you want an HA pair of pfsense - or just another on its own another hop?

      If you want to setup HA pair of pfsense
      https://docs.netgate.com/pfsense/en/latest/recipes/high-availability.html

      what is the point of setting up all the HA stuff, when you then have 2 single points of failure - the edge router and then your udm are both single points that could fail..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • R
        rfinch23 @JKnott
        last edited by

        @jknott you are right, but this is what we have ended up with, as mentioned the goal is to be able to better monitor the internet traffic.
        So the bullet points would be:

        1. make sure we are not bunny hopping the three bottom switches by using a pair of switches
        2. make sure the pfsense does not become a single point of failure and can monitor all internet traffic.
        3. we could have a hot standby UDMP id required. The UDMP handles all the unifi switches, AP's and some cameras and the WAN links
        4. there may be a second internet connection now the UDMP can handle two WAN connection.
          was just throwing this out there for some suggestion on if this is possable, if so how.

        i hope this clarifies what we are trying to do.

        JKnottJ 1 Reply Last reply Reply Quote 0
        • R
          rfinch23 @JKnott
          last edited by

          @jknott the goal is to be able to better monitor the internet traffic. but still use the UDMP to manage the unifi estate that consists of Unifi switches, AP's ans some cameras.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @rfinch23
            last edited by johnpoz

            @rfinch23 what is the point of pfsense? If you want to leverage UDMP? Seems like your throwing in another complexity and just something else that could fail?

            And those switches you show are they part of the unifi infrastructure?

            Where exactly are the AP going to connect? You are most likely going to have hairpinning or have to deal with L3 adoption if being controlled by the UDMP..

            edit: Is your goal to have pfsense monitor traffic, so your not wanting to leverage DPI on the UDMP? If that is the case there is no reason to route through it.. If your going to leverage dpi on udmp - what is the point of pfsense?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            R 1 Reply Last reply Reply Quote 0
            • R
              rfinch23 @johnpoz
              last edited by

              @johnpoz yes all the switches shown are under the UDMP.

              Currently there are 75 cable connection and 61 WiFi connections

              Mixture of PC’s, servers, tablets ,some IoT’s, phones, intercoms and cameras.

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @rfinch23
                last edited by

                @rfinch23

                Your network is so messed up, I missed that 3rd router @johnpoz mentioned. You need one, count 'em, one router for a network. The way you have it, you now have at least 3 single points of failure.

                but still use the UDMP to manage the unifi estate that consists of Unifi switches, AP's ans some cameras.

                I run the Unifi software on my main desktop system. Regardless there are other ways, such as the Unifi controller or a Raspberry Pi running Ubuntu Linux and the Unifi software. You could also run it on any Windows systems you have handy.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @JKnott
                  last edited by johnpoz

                  He can still leverage the UDMP to manage his unifi stuff, but there was another thread where that user was trying to route through the udm, when really there was no reason to..

                  Just because something can route, doesn't mean it has too ;) Just like a layer 3 switch that can do routing.. You can just use it as layer 2, or you could use it as combo where it routes some stuff but only layer 2 for other vlans.

                  Same goes for this udmp - you don't have to leverage its routing if you don't want too.. They don't go into this over on the unifi forums and docs - because why would anyone ever want to do that ;) heheh

                  Are you trying to leverage the DPI monitoring you can do with the UDMP - or are you wanting to use the pfsense to monitor. I get using the udmp for your unifi infrastructure. But if your going to leverage it at the edge - just not seeing what is the point of pfsense?

                  I don't believe the udmp supports lacp, so is that what your wanting leverage pfsense for? Just seems like this overly complex without any clear direction of exactly wanting to accomplish..

                  Since it seems pretty impossible to leverage the udmp for any sort of HA, something that has been requested for some time over on the unifi forums.. So if HA is your goal - I would just use the udmp for your cameras and other unifi infrastructure and not try and leverage its routing or dpi.. But I don't get all the desire of HA when you clearly have multiple single points of failure upstream, especially if you try and use the udmp at the edge.. If your going to be ok with spare swap box for the udmp.. Why not just have a swap switch as well - and then just take pfsense out of the picture?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  R 1 Reply Last reply Reply Quote 0
                  • R
                    rfinch23 @johnpoz
                    last edited by

                    @johnpoz This sounds good removing the UDMP from the routing and using it just as a controller. So would I then be better also offloading the DHCP to the pfsense as well? It will however be a shame loosing the DPI as a layer of protection.

                    If I concentrate on the pfsense would it be possible to use a vigor 130 modem and use the pfsense to authenticate to the ISP? Then turn on the pfsense firewall and NAT to control traffic and any NAT that is currently used?

                    How would I configure the pfsense interfaces to connect to both the top switches and support all the internal networks?

                    This sounds like it would all help to simplify the network. I could then look at using HA with the pfsense.

                    Many thanks for both your suggestions to date
                    As you can see from all my question I am new to the pfsense.

                    So really appreciate all your help.

                    stephenw10S 1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator @rfinch23
                      last edited by

                      @rfinch23 said in So what I would like to achieve is the following to allow monitoring…:

                      If I concentrate on the pfsense would it be possible to use a vigor 130 modem and use the pfsense to authenticate to the ISP? Then turn on the pfsense firewall and NAT to control traffic and any NAT that is currently used?

                      Yes. Assuming it's a PPPoE connection, which it almost certainly is with that modem.

                      Do those switches support stacking with cross-chassis LACP?
                      If so you should use that for redundancy.

                      Steve

                      R 1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @rfinch23
                        last edited by

                        @rfinch23

                        I just came across this video, which might give you some ideas.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        R 1 Reply Last reply Reply Quote 0
                        • R
                          rfinch23 @stephenw10
                          last edited by

                          @stephenw10 Hi, Yes the ISP will be using PPPoE
                          And No Multi-chassis Link Aggregation Group (MLAG). Support on the switches

                          https://help.ui.com/hc/en-us/articles/360007279753-UniFi-USW-Configuring-Link-Aggregation-Groups-LAG-

                          1 Reply Last reply Reply Quote 0
                          • R
                            rfinch23 @JKnott
                            last edited by

                            @jknott Thanks, very interesting.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.