Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Add another pfSense, making home setup a dual fw setup.

    Scheduled Pinned Locked Moved General pfSense Questions
    7 Posts 4 Posters 704 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bingo600B
      bingo600
      last edited by bingo600

      I have been grumbling for some time, if it would increase security (hacker penetration).
      To add another pfSense to my "home setup".

      I have 3 x Nexcom embedded boards
      Intel E3845 w. 4GB Ram , and 2 x Intel 210 netcards.

      DS-EBC355.pdf.zip

      In some "high security" setups i have made we used a dual firewall setup.
      But there the idea was: Must use different manuf.

      Rationale:
      1 - If one fw OS had a vuln. the other hopefully hadn't.
      2 - You had to implement the rules differently , and maybe you caught a mistake, if you had to do it differently on the "other box" ...

      We're getting "hammered" here in DK by :
      1:
      Putins Trolls , because of DK support to UKR

      2:
      Some "DK Fool" decided to burn a couple of Korans.
      That unfortunately falls under the law of free speech/expression here , we can't prevent it.
      And we're now facing the wrath of ........

      Most of the attacks from "2" are DDOS, and some web defacing. I don't expose a webserver , and a serious DDOS i can't prevent.
      So i'm basically talking about OS/Firewall internal vuln's.
      And maybe catch if i "GOOF seriously" in a rule ... But my WAN rules are kept at a minimun.

      I could put a Nexcomm board in front of my main firewall , and basically let it handle all Internet traffic, an E3845 should be able to handle my 250Mb connection wo probs.

      I'd disable NAT (PAT) on the inner main firewall , in order to avoid dual NAT.
      And move my OpenVPN daemons to the outer firewall, and do my single (e-mail server portforward) on the outer firewall.

      But since i'll be using pfSense Plus on both, i'll not get the dual Manuf. protection.
      I might benefit from rule creating on "Dual Zones (Fwalls)".

      I could do it as a "Just because i can" excersize , would only cost the "power" (10W TDP)

      But is it worth it ??

      Hmmm .... TNSR on the outer ..... Hmmm
      Is TNSR free for home usage ??
      Can it do OpenVPN Servers , and somewhat "Easy user add" ?
      I'd like to keep pfS on the inner.

      /Bingo

      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @bingo600
        last edited by

        @bingo600 What is the external exposure...? Seems like that could only be a bad firewall or NAT rule that unexpectedly allowed access to the WAN IP or a device on LAN? In that case I'd myself probably fall into the trap of duplicating rules on both, vs. having someone else create their own ruleset on the inner firewall. I don't think there is much chance of a flaw that allows packets past the firewall.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote šŸ‘ helpful posts!

        bingo600B 1 Reply Last reply Reply Quote 0
        • bingo600B
          bingo600 @SteveITS
          last edited by bingo600

          @steveits said in Add another pfSense, making home setup a dual fw setup.:

          @bingo600 What is the external exposure...?

          That would be someone from the outside trying to get in.
          Not plain portscan or the likes.
          But someone targeting a "potential Zero Day or known but yet unfixed/unpatched" vuln. in the pfS.

          Seems like that could only be a bad firewall or NAT rule that unexpectedly allowed access to the WAN IP or a device on LAN?
          It's not the rules ... But OS or Intel AMS or .....

          In that case I'd myself probably fall into the trap of duplicating rules on both, vs. having someone else create their own ruleset on the inner firewall.

          I was thinking somewhat the same ... If i make a bad/misunderstood rule on the "inner" it would be likely that i duplicated the mistake on the "outer".

          I don't think there is much chance of a flaw that allows packets past the firewall.

          I know pfSense is proven & hardened ....
          But my "Tinfoil Hat is itching" ... Annnnd i do have this little $55 thingy šŸ˜€

          I just had to bring one up ...
          af13890a-3a61-4504-bd14-8195038e2c21-image.png

          .
          .
          .
          49c0e87a-ddfc-488e-993b-b53ab664ba0f-image.png
          .
          .
          .

          But i also know ... More boxes, more failure possibilities.

          IMHO it would only make sense if i go with another OS: TNSR or even "The unmentionable "cousin"...." 🤐

          Keep'em comming

          /Bingo

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          1 Reply Last reply Reply Quote 0
          • NollipfSenseN
            NollipfSense
            last edited by

            I had been thinking dual pfSense, one metal and the other virtual; however, in my case, it is to get around cg-NAT. I also thought about an option on the virtual of using TNSR (if I get the okay from Netgate) despite my resistance to all CLI...I am a GUI person Apple spoiled.

            pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
            pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

            bingo600B 1 Reply Last reply Reply Quote 0
            • bingo600B
              bingo600 @NollipfSense
              last edited by bingo600

              @nollipfsense said in Add another pfSense, making home setup a dual fw setup.:

              despite my resistance to all CLI...I am a GUI person Apple spoiled.

              I like CLI - Almost all my Linux servers have no GUI installed at all.

              I was brought up on a 24x40 TV monitor "Terminal" connected to a Flex09 (MC6809) system.
              Then CP/M and then MS-DOS ...

              Began toying w Linux around 97' , and switched away from Windows around 2005 , been using linux as main OS ever since.

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              1 Reply Last reply Reply Quote 0
              • Dobby_D
                Dobby_
                last edited by

                The main point is that, if you use two different system (OS)
                and two different boxes (hardware) any problem or vuln`
                will be hold at the first or second box, or both boxes will
                affected!

                Hardware based:
                You use TurboBoost and HT on both machines and HT
                is having a problem let us say as an example, so now
                it is not really important because both boxes are "open".

                Problem based:
                If you are using something with NAT (a router) in front of
                (WAN) and behind that the firewall, you may be able to prevent a DDOS, but an amplified DDOS attack is not
                able to hold away! But you will be having let us say less
                points if you are using a DMZ with servers inside, such
                as web, mail and fileservers (FTP), like a firewall offers
                to you.

                Software based:
                If you use a Linux based and a FreeBSD based OS
                and both are using OpenSSL............

                pfSense as the border (WAN) gateway and a mikrotik router with NAT and IPv4 behind the pfSense may be
                not that bad. And between them the servers like web
                connected servers.

                Based on your problem (DDOS) I would think it is nice
                to go with a router in front of the pfSense, but if servers
                such web, mail and ftp will be in the DMZ then I would
                go with the pfSense in front of the router.

                Your both devices may be good for;

                • MikroTik RouterOS
                • OpenWRT
                • TSNR

                or as an addon devices like

                • Logging server
                • Snort or Suricata server
                • PI hole and/or AdGuard
                • WiFi device`s

                A single card or port for the dmz port may be also nice to have no other data are "shared" over this switch chip there.

                Caching proxy in front of your lan and reverse proxy in
                front of your dmz and nothing is directly connected to
                internet, ids in fron of the dmz and the lan will be doing
                also something on top of all.

                #~. @Dobby

                Turris Omnia - 4 Ports - 2 GB RAM / TurrisOS 7 Release (Btrfs)
                PC Engines APU4D4 - 4 Ports - 4 GB RAM / pfSense CE 2.7.2 Release (ZFS)
                PC Engines APU6B4 - 4 Ports - 4 GB RAM / pfSense+ (Plus) 24.03_1 Release (ZFS)

                bingo600B 1 Reply Last reply Reply Quote 0
                • bingo600B
                  bingo600 @Dobby_
                  last edited by bingo600

                  @dobby_

                  I can't fight DDOS ... (Only the ISP's can "Scrub those data volumes"
                  Even back in 2013 i was at a company that had 4 x 100Mbit lines , and they were all flodded.
                  In the end we had to subscribe to a (rather expensive to activate) "Scrubbing service" at the ISP's.

                  What i hope for by using two different "implementations" would be :
                  To avoid some "unknown Zero day exploit" or a "Build error" from the manufactor.

                  If I GOOF , in implementing rules .. It really depends.
                  Did i hit wrong button (maybe correctable in the other fw) or did i misunderstand and implemented the same "error" on both systems (not correctable on he other fw).

                  /Bingo

                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                  pfSense+ 23.05.1 (ZFS)

                  QOTOM-Q355G4 Quad Lan.
                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.