Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    Cope bad peering of ISP Deutsche Telekom

    General pfSense Questions
    5
    16
    132
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Bob.Dig
      Bob.Dig last edited by Bob.Dig

      Network noob here,

      as discussed here, five days ago I got me a new ISP (Deutsche Telekom). This ISP does really bad peering and that makes problems, for instance with downloading the snort-subscriber rules, the download never finishes. Maybe pfBlocker feeds are also affected, can't tell.
      I can use a VPN to circumvent that behavior for my daily browsing routines and I already used one before with pfSense, but what I don't want to do is making the vpn the default gateway of pfSense.

      @DaddyGo and others.
      So how can I solve this just for pfSense itself (Suricata Snort-rules), without using a vpn as the default gateway. Maybe with static routes or NAT on the WAN-interface? Any in-depth help would be appreciated. I don't know much about NAT and did policy routing only on LAN before.

      JKnott 1 Reply Last reply Reply Quote 0
      • Rico
        Rico LAYER 8 Rebel Alliance last edited by

        MTU issue?
        Test download URL? I have access to ~30 Sites with Deutsche Telekom to check.

        -Rico

        Bob.Dig 1 Reply Last reply Reply Quote 0
        • Bob.Dig
          Bob.Dig @Rico last edited by Bob.Dig

          @rico said in Cope bad peering of ISP Deutsche Telekom:

          MTU issue?
          Test download URL? I have access to ~30 Sites with Deutsche Telekom to check.

          So I noticed it myself with the snort subscriber rules, you can test this yourself, if you have a snort account (for example snortrules-snapshot-29161.tar.gz).
          I also have found problems with a small tool (500KB) hosted on AWS, but right now I can download it fast so sharing the url doesn't make sense. Yesterday evening the download coudn't finish at all.

          Also what I noticed since having the new ISP, the thinkbroadband quality monitor is showing much blue for 12 hours.

          uk peering.png

          DaddyGo 1 Reply Last reply Reply Quote 0
          • DaddyGo
            DaddyGo @Bob.Dig last edited by

            @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

            you can test this yourself, if you have a snort account (for example snortrules-snapshot-29161.tar.gz).

            This is clearly a problem....

            what does a traceroute point to snort.org?

            there is no problem for us with this, I just tried:
            f1d9a0fb-d14f-4c54-a401-a10c4048af2a-image.png

            have you tried this?
            https://kb.netgear.com/19863/Ping-Test-to-determine-Optimal-MTU-Size-on-Router

            Bob.Dig 1 Reply Last reply Reply Quote 1
            • Bob.Dig
              Bob.Dig @DaddyGo last edited by Bob.Dig

              @daddygo said in Cope bad peering of ISP Deutsche Telekom:

              what does a traceroute point to snort.org?

              Shows not much I think, but dl speed defers drastically


              Capturex.PNG

              old isp dl.PNG

              tracert.PNG

              @daddygo said in Cope bad peering of ISP Deutsche Telekom:

              have you tried this?
              https://kb.netgear.com/19863/Ping-Test-to-determine-Optimal-MTU-Size-on-Router

              No, because everything else is working as expected, it is a peering problem at least to AWS.

              So guys, what to do in practice?

              DaddyGo 1 Reply Last reply Reply Quote 0
              • DaddyGo
                DaddyGo @Bob.Dig last edited by

                @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

                So guys, what to do in practice?

                this will be hard to circumvent with NAT and things like that...

                as I understood the German articles on the theme...

                Deutsche Telekom is misbehaving with large network traffic suppliers "players" such as Hurrican Electric, AWS, etc.

                open a ticket with measurements evidence and if they can't help you will have a reason to get rid of it

                https://www.peeringdb.com/net/196

                Bob.Dig 1 Reply Last reply Reply Quote 0
                • Bob.Dig
                  Bob.Dig @DaddyGo last edited by Bob.Dig

                  @daddygo said in Cope bad peering of ISP Deutsche Telekom:

                  this will be hard to circumvent with NAT and things like that...

                  Couldn't I use pfBlocker to create an alias for AWS and then selectively route this through a vpn (on WAN though) or create a static route for that somehow?

                  stephenw10 DaddyGo 2 Replies Last reply Reply Quote 0
                  • JKnott
                    JKnott @Bob.Dig last edited by

                    @bob-dig

                    What do you mean by "peering". That's where carriers and ISPs meet to exchange data. For example, my ISP peers at the Toronto Internet Exchange. You mention AWS, but unless they have a point of presence at the same location as your ISP, they're not peering.

                    Bob.Dig 1 Reply Last reply Reply Quote 0
                    • stephenw10
                      stephenw10 Netgate Administrator @Bob.Dig last edited by

                      You can try to do that. If you can make an alias of all of AWS you can static route it via a VPN gateway. That will apply all traffic including any client traffic not policy routed.

                      Steve

                      Bob.Dig 1 Reply Last reply Reply Quote 0
                      • DaddyGo
                        DaddyGo @Bob.Dig last edited by DaddyGo

                        @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

                        Couldn't I use pfBlocker to create an alias for AWS

                        but yes, you only have to do this with all the intermediate network players 😉

                        it would be a horror job and you don’t know when your packages will travel and which route

                        f.e.:
                        in the EU travels a lot of package on the HE network

                        BTW:
                        Telekom is also in a bad relationship with them

                        +++edit:
                        like you said you don't just notice this problem towards AWS....(?!)

                        1 Reply Last reply Reply Quote 0
                        • Bob.Dig
                          Bob.Dig @stephenw10 last edited by Bob.Dig

                          @stephenw10 said in Cope bad peering of ISP Deutsche Telekom:

                          You can try to do that. If you can make an alias of all of AWS you can static route it via a VPN gateway. That will apply all traffic including any client traffic not policy routed.

                          Steve

                          Thanks steve, but where to "put" it. It should be used at least by Suricata and pfBlocker.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10
                            stephenw10 Netgate Administrator last edited by

                            Add is as a static route in Sys > Routing > Static Routes.

                            It might get ugly with an alias that tries to include all of AWS as that will be huge. Your routing table will end up.... large!

                            There is no way to policy route traffic from the firewall itself so it will apply to all traffic that isn't otherwise policy routed.

                            Steve

                            Bob.Dig 1 Reply Last reply Reply Quote 1
                            • Bob.Dig
                              Bob.Dig @stephenw10 last edited by Bob.Dig

                              @stephenw10 I checked with a rule on lan, worked flawlessly with the snort rules download.

                              Capturexyz.PNG

                              That table I created has 2,055 records though...

                              How could I do that or at least test it on "wan"? Is it doable in the gui?
                              I can't load these pfBlocker Aliases under System/Routing/Static Routes.

                              @DaddyGo To be clear, I want to get rid of them asap, but I signed a two year contract...

                              Bob.Dig 1 Reply Last reply Reply Quote 0
                              • Bob.Dig
                                Bob.Dig @Bob.Dig last edited by Bob.Dig

                                @bob-dig said in Cope bad peering of ISP Deutsche Telekom:

                                How could I do that or at least test it on "wan"? Is it doable in the gui?
                                I can't load these pfBlocker Aliases under System/Routing/Static Routes.

                                For the lols I guess, I tried this, but also wasn't working:

                                Captureabba.PNG

                                I do have a VPS though and routing it there seems to be a viable solution. But I have configured it to connect to me and not the other way around and I am somewhat noobish when it comes to my own OVPN-installations, so the firewall itself will be the last to have internet. 🙄

                                1 Reply Last reply Reply Quote 0
                                • Bob.Dig
                                  Bob.Dig @JKnott last edited by

                                  @jknott said in Cope bad peering of ISP Deutsche Telekom:

                                  You mention AWS, but unless they have a point of presence at the same location as your ISP, they're not peering.

                                  Ok, then I meant routing because of bad peering or just bad routing in general. 😉

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10
                                    stephenw10 Netgate Administrator last edited by

                                    Yeah, it would need to actually route to it using a static route. Outbound NAT does not route traffic.

                                    You're right though, you can't use a URL alias in a static route. Which is reasonable since adding 2055 routes to the table would be.... ugly at best!

                                    Steve

                                    1 Reply Last reply Reply Quote 1
                                    • First post
                                      Last post

                                    Products

                                    • Platform Overview
                                    • TNSR
                                    • pfSense Plus
                                    • Appliances

                                    Services

                                    • Training
                                    • Professional Services

                                    Support

                                    • Subscription Plans
                                    • Contact Support
                                    • Product Lifecycle
                                    • Documentation

                                    News

                                    • Media Coverage
                                    • Press
                                    • Events

                                    Resources

                                    • Blog
                                    • FAQ
                                    • Find a Partner
                                    • Resource Library
                                    • Security Information

                                    Company

                                    • About Us
                                    • Careers
                                    • Partners
                                    • Contact Us
                                    • Legal
                                    Our Mission

                                    We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                                    Subscribe to our Newsletter

                                    Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                                    © 2021 Rubicon Communications, LLC | Privacy Policy