<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Add another pfSense, making home setup a dual fw setup.]]></title><description><![CDATA[<p dir="auto">I have been grumbling for some time, if it would increase security (hacker penetration).<br />
To add another pfSense to my "home setup".</p>
<p dir="auto">I have 3 x Nexcom embedded boards<br />
Intel E3845 w. 4GB Ram , and 2 x Intel 210 netcards.</p>
<p dir="auto"><a href="/assets/uploads/files/1677142541335-ds-ebc355.pdf.zip">DS-EBC355.pdf.zip</a></p>
<p dir="auto">In some "high security" setups i have made we used a dual firewall setup.<br />
But there the idea was: <strong>Must use different manuf.</strong></p>
<p dir="auto">Rationale:<br />
1 - If one fw OS had a vuln. the other hopefully hadn't.<br />
2 - You had to implement the rules differently , and maybe you caught a mistake, if you had to do it differently on the "other box" ...</p>
<p dir="auto">We're getting "hammered" here in DK by :<br />
1:<br />
Putins Trolls , because of DK support to UKR</p>
<p dir="auto">2:<br />
Some "DK Fool" decided to burn a couple of Korans.<br />
That unfortunately falls under the law of free speech/expression here , we can't prevent it.<br />
And we're now facing the wrath of ........</p>
<p dir="auto">Most of the attacks from "2" are DDOS, and some web defacing. I don't expose a webserver , and a serious DDOS i can't prevent.<br />
So i'm basically talking about OS/Firewall internal vuln's.<br />
And maybe catch if i "GOOF seriously" in a rule ... But my WAN rules are kept at a minimun.</p>
<p dir="auto">I could put a Nexcomm board in front of my main firewall , and basically let it handle all Internet traffic, an E3845 should be able to handle my 250Mb connection wo probs.</p>
<p dir="auto">I'd disable NAT (PAT) on the inner main firewall , in order to avoid dual NAT.<br />
And move my OpenVPN daemons to the outer firewall, and do my single (e-mail server portforward) on the outer firewall.</p>
<p dir="auto">But since i'll be using pfSense Plus on both, i'll not get the dual Manuf. protection.<br />
I might benefit from rule creating on "Dual Zones (Fwalls)".</p>
<p dir="auto">I could do it as a "Just because i can" excersize , would only cost the "power" (10W TDP)</p>
<p dir="auto"><strong>But is it worth it ??</strong></p>
<p dir="auto">Hmmm .... TNSR on the outer ..... Hmmm<br />
Is TNSR free for home usage ??<br />
Can it do OpenVPN Servers , and somewhat "Easy user add"  ?<br />
I'd like to keep pfS on the inner.</p>
<p dir="auto">/Bingo</p>
]]></description><link>https://forum.netgate.com/topic/178206/add-another-pfsense-making-home-setup-a-dual-fw-setup</link><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 17:33:42 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/178206.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 23 Feb 2023 08:54:17 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Add another pfSense, making home setup a dual fw setup. on Sat, 25 Feb 2023 22:00:59 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/dobby_">@<bdi>dobby_</bdi></a></p>
<p dir="auto">I can't fight DDOS ... (Only the ISP's can "Scrub those data volumes"<br />
Even back in 2013 i was at a company that had 4 x 100Mbit lines , and they were all flodded.<br />
In the end we had to subscribe to a (rather expensive to activate) "Scrubbing service" at the ISP's.</p>
<p dir="auto">What i hope for by using two different "implementations" would be :<br />
To avoid some "unknown Zero day exploit" or a "Build error" from the manufactor.</p>
<p dir="auto">If I GOOF , in implementing rules .. It really depends.<br />
Did i hit wrong button (maybe correctable in the other fw)  or did i misunderstand and implemented the same "error" on both systems (not correctable on he other fw).</p>
<p dir="auto">/Bingo</p>
]]></description><link>https://forum.netgate.com/post/1090398</link><guid isPermaLink="true">https://forum.netgate.com/post/1090398</guid><dc:creator><![CDATA[bingo600]]></dc:creator><pubDate>Sat, 25 Feb 2023 22:00:59 GMT</pubDate></item><item><title><![CDATA[Reply to Add another pfSense, making home setup a dual fw setup. on Sat, 25 Feb 2023 01:09:35 GMT]]></title><description><![CDATA[<p dir="auto">The main point is that, if you use two different system (OS)<br />
and two different boxes (hardware) any problem or vuln`<br />
will be hold at the first or second box, or both boxes will<br />
affected!</p>
<p dir="auto"><em>Hardware based:</em><br />
You use TurboBoost and HT on both machines and HT<br />
is having a problem let us say as an example, so now<br />
it is not really important because both boxes are "open".</p>
<p dir="auto"><em>Problem based:</em><br />
If you are using something with NAT (a router) in front of<br />
(WAN) and behind that the firewall, you may be able to prevent a DDOS, but an amplified DDOS attack is not<br />
able to hold away! But you will be having let us say less<br />
points if you are using a DMZ with servers inside, such<br />
as web, mail and fileservers (FTP), like a firewall offers<br />
to you.</p>
<p dir="auto"><em>Software based:</em><br />
If you use a Linux based and a FreeBSD based OS<br />
and both are using OpenSSL............</p>
<p dir="auto">pfSense as the border (WAN) gateway and a mikrotik router with NAT and IPv4 behind the pfSense may be<br />
not that bad. And between them the servers like web<br />
connected servers.</p>
<p dir="auto">Based on your problem (DDOS) I would think it is nice<br />
to go with a router in front of the pfSense, but if servers<br />
such web, mail and ftp will be in the DMZ then I would<br />
go with the pfSense in front of the router.</p>
<p dir="auto">Your both devices may be good for;</p>
<ul>
<li>MikroTik RouterOS</li>
<li>OpenWRT</li>
<li>TSNR</li>
</ul>
<p dir="auto">or as an addon devices like</p>
<ul>
<li>Logging server</li>
<li>Snort or Suricata server</li>
<li>PI hole and/or AdGuard</li>
<li>WiFi device`s</li>
</ul>
<p dir="auto">A single card or port for the dmz port may be also nice to have no other data are "shared" over this switch chip there.</p>
<p dir="auto">Caching proxy in front of your lan and reverse proxy in<br />
front of your dmz and nothing is directly connected to<br />
internet, ids in fron of the dmz and the lan will be doing<br />
also something on top of all.</p>
]]></description><link>https://forum.netgate.com/post/1090148</link><guid isPermaLink="true">https://forum.netgate.com/post/1090148</guid><dc:creator><![CDATA[Dobby_]]></dc:creator><pubDate>Sat, 25 Feb 2023 01:09:35 GMT</pubDate></item><item><title><![CDATA[Reply to Add another pfSense, making home setup a dual fw setup. on Thu, 23 Feb 2023 16:01:26 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/nollipfsense">@<bdi>nollipfsense</bdi></a> said in <a href="/post/1089664">Add another pfSense, making home setup a dual fw setup.</a>:</p>
<blockquote>
<p dir="auto">despite my resistance to all CLI...I am a GUI person Apple spoiled.</p>
</blockquote>
<p dir="auto">I like CLI - Almost all my Linux servers have no GUI installed at all.</p>
<p dir="auto">I was brought up on a 24x40 TV monitor "Terminal" connected to a Flex09 (MC6809) system.<br />
Then CP/M and then MS-DOS ...</p>
<p dir="auto">Began toying w Linux around 97' , and switched away from Windows around 2005 , been using linux as main OS ever since.</p>
]]></description><link>https://forum.netgate.com/post/1089667</link><guid isPermaLink="true">https://forum.netgate.com/post/1089667</guid><dc:creator><![CDATA[bingo600]]></dc:creator><pubDate>Thu, 23 Feb 2023 16:01:26 GMT</pubDate></item><item><title><![CDATA[Reply to Add another pfSense, making home setup a dual fw setup. on Thu, 23 Feb 2023 15:54:14 GMT]]></title><description><![CDATA[<p dir="auto">I had been thinking dual pfSense, one metal and the other virtual; however, in my case, it is to get around cg-NAT. I also thought about an option on the virtual of using TNSR (if I get the okay from Netgate) despite my resistance to all CLI...I am a GUI person Apple spoiled.</p>
]]></description><link>https://forum.netgate.com/post/1089664</link><guid isPermaLink="true">https://forum.netgate.com/post/1089664</guid><dc:creator><![CDATA[NollipfSense]]></dc:creator><pubDate>Thu, 23 Feb 2023 15:54:14 GMT</pubDate></item><item><title><![CDATA[Reply to Add another pfSense, making home setup a dual fw setup. on Thu, 23 Feb 2023 16:09:05 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/steveits">@<bdi>steveits</bdi></a> said in <a href="/post/1089654">Add another pfSense, making home setup a dual fw setup.</a>:</p>
<blockquote>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/bingo600">@<bdi>bingo600</bdi></a> What is the external exposure...?</p>
</blockquote>
<p dir="auto">That would be someone from the outside trying to get in.<br />
Not plain portscan or the likes.<br />
But someone targeting a "potential Zero Day or known but yet unfixed/unpatched" vuln. in the pfS.</p>
<blockquote>
<p dir="auto">Seems like that could only be a bad firewall or NAT rule that unexpectedly allowed access to the WAN IP or a device on LAN?<br />
It's not the rules ... But OS or Intel AMS or .....</p>
</blockquote>
<blockquote>
<p dir="auto">In that case I'd myself probably fall into the trap of duplicating rules on both, vs. having someone else create their own ruleset on the inner firewall.</p>
</blockquote>
<p dir="auto">I was thinking somewhat the same ... If i make a bad/misunderstood rule on the "inner" it would be likely that i duplicated the mistake on the "outer".</p>
<blockquote>
<p dir="auto">I don't think there is much chance of a <em>flaw</em> that allows packets past the firewall.</p>
</blockquote>
<p dir="auto">I know pfSense is proven &amp; hardened ....<br />
But my "Tinfoil Hat is itching" ... Annnnd i do have this little $55 thingy <img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f600.png?v=d00e50224fa" class="not-responsive emoji emoji-android emoji--grinning" style="height:23px;width:auto;vertical-align:middle" title=":grinning:" alt="😀" /></p>
<p dir="auto">I just had to bring one up ...<br />
<img src="/assets/uploads/files/1677167392005-af13890a-3a61-4504-bd14-8195038e2c21-image.png" alt="af13890a-3a61-4504-bd14-8195038e2c21-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">.<br />
.<br />
.<br />
<img src="/assets/uploads/files/1677167736862-49c0e87a-ddfc-488e-993b-b53ab664ba0f-image.png" alt="49c0e87a-ddfc-488e-993b-b53ab664ba0f-image.png" class=" img-fluid img-markdown" /><br />
.<br />
.<br />
.</p>
<p dir="auto">But i also know ... More boxes, more failure possibilities.</p>
<p dir="auto">IMHO it would only make sense if i go with another OS: TNSR or even "The unmentionable "cousin"...."  <img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f910.png?v=d00e50224fa" class="not-responsive emoji emoji-android emoji--zipper_mouth_face" style="height:23px;width:auto;vertical-align:middle" title=":zipper_mouth_face:" alt="🤐" /></p>
<p dir="auto">Keep'em comming</p>
<p dir="auto">/Bingo</p>
]]></description><link>https://forum.netgate.com/post/1089663</link><guid isPermaLink="true">https://forum.netgate.com/post/1089663</guid><dc:creator><![CDATA[bingo600]]></dc:creator><pubDate>Thu, 23 Feb 2023 16:09:05 GMT</pubDate></item><item><title><![CDATA[Reply to Add another pfSense, making home setup a dual fw setup. on Thu, 23 Feb 2023 15:25:33 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/bingo600">@<bdi>bingo600</bdi></a> What is the external exposure...?  Seems like that could only be a bad firewall or NAT rule that unexpectedly allowed access to the WAN IP or a device on LAN?  In that case I'd myself probably fall into the trap of duplicating rules on both, vs. having someone else create their own ruleset on the inner firewall.  I don't think there is much chance of a <em>flaw</em> that allows packets past the firewall.</p>
]]></description><link>https://forum.netgate.com/post/1089654</link><guid isPermaLink="true">https://forum.netgate.com/post/1089654</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Thu, 23 Feb 2023 15:25:33 GMT</pubDate></item></channel></rss>