ATT Internet AIr
-
-
-
@ahole4sure - glad you got things up and running.
My settings are similar except that I'm using Unbound in resolver mode so I have no additional DNS Servers defined under General Setup > DNS Server Settings.
Which gateway did you end up getting from AT&T for the Internet Air service? The one I received does allow for IP passthrough so I can get a public IP on the pfSense side.
Hope this helps.
-
Mmm, interesting. Yeah it should work is resolving mode behind a failover gateway group as @tman222 shows. Curious that it's failing for you.
You should not have a gateway set against 8.8.8.8 so it's available for use on either WAN. Especially since you have at least one device hard coded to use that directly.
-
@stephenw10
I guess I’m confused a little
Maybe even with terminologyI have DNS Resolver enabled. I never disabled it. I just enabled “forwarding mode” in the DNS Resolver settings.
And another thing I don’t understand is that in the General Setup page I have WAN2 supposedly hardcoded to use 8.8.8.8, and WAN to use 8.8.4.4
But based on the command line results 192.168.2.2 used 8.8.8.8 to resolve the addressSo I’m confused as to what is happening
AND how I should have things setup?? -
@tman222
Yeah I am a bit confused because I have DNS Reolver enabled - but under those settings I have check to use DNS Forwarding mode -- so I guess I don't understand what that means??Attached is the model Internet Air that I am using.
In the settings I do have an option to set DMZ to a particular address and to "allow IP passthrough" but it doesn't seem to be actually doing the passthrough??
Do you have actual settings like a "bridge mode" - could you possibly send a screenshot of your Internet Air settings page where you are able to accomplish "passthrough"? -
Unbound in it's default config acts as a DNS resolver. That means it queries the DNS root servers directly. If you run a DNS leak test whilst using that it will show your WAN IP address.
When you set it in forwarding mode (or use the separate DNS forwardibg service, dnsmasq) queries from LAN clients are forwarded to external DNS servers. Either those configured in general setup or passed by your ISP via DHCP. There they may be forwarded again If you run a DNS leak test when running that it will show the public IP of the final server that resoles queries.
Both modes should work behind failover WANs.
-
@stephenw10
I guess I'm still confused since "forwarding" is still a sub-section under the main page of DNS Resolver and is a sub-setting under enabling DNS Resolver
From the explanantion as I understand it - it's like the setting page allows you to enable unbound or DNS Resolver and then bypass it (or disable it) all on the same page ?? -
There are two DNS services that can be enabled in pSense.
The 'DNS Resolver' is Unbound and that resolves directly but can be set to forward also.
The 'DNS Forwarder' is dnsmasq. It's what pfSense used by default in much older versions and is included for compatibility. It can only run as forwarder. -
@stephenw10
So whats the differnece beteween DNS Forwarder (which I do NOT have enabled ) and the DNS Query Forwarding - enable forwarding mode , which I do have enabled ?? -
Both will forward queries. dnsmasq is included for backwards compatibility with much older configs.
Unbound is a lot more flexible and powerful, even in forwarding mode. If you are using dns based filtering via pfBlocker-NG that can only use Unbound for example.
-
@tman222
Hey sorry to bug you again - I was hoping you could answer some questions about your setup. I have tried diligently to get info about my “internet Air for Business” device and today the tech support rep that I finally was able to speak to state and read to me the disclaimer - “this device will support IP passthrough”.I think because of this I am not able to obtain a public IP address when this device is connected to my pFsense router - thus the 192.168.2.2 address that I am getting with DHCP despite enabling the DMZ.
I run a few services behind my firewall that for failover to truly be functional I not only need the outgoing internet access but the incoming connection to those services is almost as essential!
Probably related - I was testing today and when I failed the primary internet WAN2 my DDNS service came up with an entirely differnt IP address than the one I would obtain my going to whatismyIP But even if went to cloudflare and manually set the IP address for my services domain names I was still unable to access them from outside.
Maybe you could share which “Internet Air” device you have had success with and the settings you have used for that device to get IP passthrough. Maybe I could trade mine for the type youare using
Thanks
-
If the DMZ works correctly then all traffic will be passed to pfSense and can be passed to something behind it. Since those services are already working behind pfSense in a private subnet they should work fine in that situation.
-
@stephenw10 I think the big term here is IF!
How do I determine if DMZ is working correctly? The pfsense box only reports the local private IP for the ATT gateway - no public address.
Also if I fail the main internet , WAN2, then when I go to the DDNS page the IP address that is reported to Cloudflare is different than the IP address I get when I go to whatismyIP on a LAN computer. And different still than the IP report on the "status" page for the ATT gateway.But most importantly when I turn off the DDNS function and manually change the Cloudflare DNS IP address for any of my services behind my HAProxy I am not able to reach them from outside. And I even have one service that is not behind Haproxy and just has a port forward (set in both the WAN and WAN2 rules) and I am not able to reach it either.
-
Send some traffic to the public IP and see if it arrives at pfSense.
Either send traffic directly from some other connection (cell phone etc) or use a port checker site. Then check the firewall logs in pfSense. Or run a pcap for that directly on the WAN.
-
@stephenw10
Thanks again for help - I guess I should be more patient , failovbut I have only 2 hairs left lolI have failed the main WAN2. The WAN is active and I get a differnt
is not IP address when I check whatsmyip on a LAN PC. The same IP (this time) appears in the DDNS. I try with a port checker on my phone port 443, and port 32400 which should be open AND I see no denials.I think my ATT gateway is not forwarding into pfsense
-
You shouldn't have to failover to test it. Just use the public IP that the AT&T router has to test against.
That DMZ setting should override any NAT forwards you have set there, everything should be forwarded to 192.168.2.2.
You won't see it blocked in the firewall logs if you have rules to pass it though. You can enable logging on those pass rules though. Or test against a port you are not forwarding in pfSense so it will be blocked and appear in the logs.
-
@stephenw10 Best I can tell nothing is getting through the ATT gateway
I can ping the "public" address of the ATT gateway but ~~seems to be making its way though the ATT gateway to the pfsense block -- nothing in the logs would indicate blocking ports that aren;t open and nothing gets through ports that supposedly are open.
And ALL port test say closed -
Hmm, well that's not good. Something else that has to be applied in the AT&T router? Is the WAN IP it has actually a public IP?
-
@stephenw10
Yes I believe it is
I can ping it publicly but can't get anything past the ATT router. I have DMZ set yo 192.168.2.2 but clearly its not getting thereI spoke to an upper level ATT guy late this afternoon - he said he would try to get me a "static IP" address , maybe that will help