[pfSense Support] pfsense bridging

2008-08-04 Thread Nuno Gonçalves

Hi all,

we are trying to use pfsense in bridging mode in a local network and 
experienced that with its use the bandwidth speed does not go beyond 
25Mb/s. Even disabling shaping rules.

Without pfsense we can go up to 40Mb/s.
Do you think it might be anything with configuration in bridging mode ? 
Or it should be a design feature or a limitation somehow?


Best Regards
Nuno



Re: [pfSense Support] pfsense bridging

2008-08-04 Thread Tim Nelson
We've got bridging setups that run well over 20mbit. What kind of NICs are you 
using? System specs/hardware? Firewall rules? 

Tim Nelson 
Systems/Network Support 
Rockbochs Inc. 
(218)727-4332 x105 

- Nuno Gonçalves wrote: 
 Hi all, 
 
 we are trying to use pfsense in bridging mode in a local network and 
 experienced that with its use the bandwidth speed does not go beyond 25Mb/s. 
 Even disabling shaping rules. 
 Without pfsense we can go up to 40Mb/s. 
 Do you think it might be anything with configuration in bridging mode ? Or it 
 should be a design feature or a limitation somehow? 
 
 Best Regards 
 Nuno 
 


Re: [pfSense Support] pfsense bridging

2008-08-04 Thread Nuno Gonçalves

Hi,
thanks on responding.
The hardware is a DELL PowerEdge R200 - Quad Core Intel® Xeon® X3220 - 
2.4GHz

The NICs are Dual embedded Broadcom Gigabit NICs.
Runing pfsense 1.2

thanks once again
Nuno




these are the pfsense rules (just in case):
TRANSLATION RULES:
nat-anchor pftpx/* all
nat-anchor natearly/* all
nat-anchor natrules/* all
rdr-anchor pftpx/* all
rdr-anchor slb all
rdr-anchor imspector all
rdr-anchor miniupnpd all

FILTER RULES:
scrub all random-id fragment reassemble
anchor ftpsesame/* all
anchor firewallrules all
block drop quick proto tcp from any port = 0 to any
block drop quick proto udp from any port = 0 to any
block drop quick proto tcp from any to any port = 0
block drop quick proto udp from any to any port = 0
block drop quick from snort2c to any label Block snort2c hosts
block drop quick from any to snort2c label Block snort2c hosts
anchor loopback all
pass in quick on lo0 all flags S/SA keep state label pass loopback
pass out quick on lo0 all flags S/SA keep state label pass loopback
anchor packageearly all
anchor carp all
pass quick inet proto icmp from 193.137.219.13 to any keep state
anchor dhcpserverlan all
pass in quick on bge1 inet proto udp from any port = bootpc to 
255.255.255.255 port = bootps keep state label allow access to DHCP 
server on LAN
pass in quick on bridge0 inet proto udp from any port = bootpc to 
255.255.255.255 port = bootps keep state label allow access to DHCP 
server on LAN
pass in quick on bge1 inet proto udp from any port = bootpc to 
193.137.219.14 port = bootps keep state label allow access to DHCP 
server on LAN
pass in quick on bridge0 inet proto udp from any port = bootpc to 
193.137.219.14 port = bootps keep state label allow access to DHCP 
server on LAN
pass out quick on bge1 inet proto udp from 193.137.219.14 port = bootps 
to any port = bootpc keep state label allow access to DHCP server on LAN
pass out quick on bridge0 inet proto udp from 193.137.219.14 port = 
bootps to any port = bootpc keep state label allow access to DHCP 
server on LAN
pass in quick on bge0 proto udp from any port = bootps to any port = 
bootpc keep state label allow dhcp client out wan
pass in quick on bridge0 proto udp from any port = bootps to any port = 
bootpc keep state label allow dhcp client out wan

block drop in on ! bge1 inet from 193.137.219.0/28 to any
block drop in on bge1 inet6 from fe80::21e:c9ff:feba:a598 to any
block drop in inet from 193.137.219.14 to any
anchor spoofing all
anchor limitingesr all
block drop in quick from virusprot to any label virusprot overload table
pass out quick on bge1 proto icmp all keep state label let out anything 
from firewall host itself
pass out quick on bridge0 proto icmp all keep state label let out 
anything from firewall host itself
pass out quick on bge0 proto icmp all keep state label let out anything 
from firewall host itself
pass out quick on bridge0 proto icmp all keep state label let out 
anything from firewall host itself
pass out quick on bge0 all flags S/SA keep state (tcp.closed 5) label 
let out anything from firewall host itself

anchor firewallout all
pass out quick on bge0 all flags S/SA keep state label let out anything 
from firewall host itself
pass out quick on bge1 all flags S/SA keep state label let out anything 
from firewall host itself
pass out quick on bridge0 all flags S/SA keep state label let out 
anything from firewall host itself
pass out quick on enc0 all flags S/SA keep state label IPSEC internal 
host to host

anchor anti-lockout all
pass in quick on bge1 inet from any to 193.137.219.14 flags S/SA keep 
state label anti-lockout web rule
block drop in log proto tcp from sshlockout to any port = ssh label 
sshlockout

anchor ftpproxy all
anchor pftpx/* all
pass in log quick on bge0 reply-to (bge0 193.137.219.2) inet all flags 
S/SA keep state label USER_RULE: WLAN - LAN
pass in log quick on bridge0 reply-to (bge0 193.137.219.2) inet all 
flags S/SA keep state label USER_RULE: WLAN - LAN
pass in log quick on bge1 all flags S/SA keep state label USER_RULE: 
Default LAN - any
pass in log quick on bridge0 all flags S/SA keep state label USER_RULE: 
Default LAN - any
pass in quick on bge1 inet proto tcp from any to 127.0.0.1 port = 
ftp-proxy flags S/SA keep state label FTP PROXY: Allow traffic to 
localhost
pass in quick on bge1 inet proto tcp from any to 127.0.0.1 port = ftp 
flags S/SA keep state label FTP PROXY: Allow traffic to localhost
pass in quick on bge0 inet proto tcp from any port = ftp-data to (bge0) 
port  49000 flags S/SA keep state label FTP PROXY: PASV mode data 
connection

anchor imspector all
anchor miniupnpd all
block drop in log quick all label Default block all just to be sure.
block drop out log quick all label Default block all just to be sure.
No queue in use



Tim Nelson wrote:
We've got bridging setups that run well over 20mbit. What kind of NICs 
are you using? System specs/hardware? Firewall rules?


Tim Nelson
Systems/Network Support
Rockbochs Inc.

Re: [pfSense Support] pfsense bridging

2008-08-04 Thread Tim Nelson
Hmmm... your hardware looks to be sufficient :-) 

I don't recall any specific problems with Broadcom NICs... if you have an Intel 
NIC or two around... give those a shot (assuming you can fit them since the 
R200 is a 1U). 

I can't see anything that jumps out at me in your ruleset... maybe try 
disabling any packages? 

Tim Nelson 
Systems/Network Support 
Rockbochs Inc. 
(218)727-4332 x105 

- Nuno Gonçalves wrote: 
 Hi, 
 thanks on responding. 
 The hardware is a DELL PowerEdge R200 - Quad Core Intel® Xeon® X3220 - 2.4GHz 
 The NICs are Dual embedded Broadcom Gigabit NICs. 
 Runing pfsense 1.2 
 
 thanks once again 
 Nuno 
 
 
 
 
 these are the pfsense rules (just in case): 
 TRANSLATION RULES: 
 nat-anchor pftpx/* all 
 nat-anchor natearly/* all 
 nat-anchor natrules/* all 
 rdr-anchor pftpx/* all 
 rdr-anchor slb all 
 rdr-anchor imspector all 
 rdr-anchor miniupnpd all 
 
 FILTER RULES: 
 scrub all random-id fragment reassemble 
 anchor ftpsesame/* all 
 anchor firewallrules all 
 block drop quick proto tcp from any port = 0 to any 
 block drop quick proto udp from any port = 0 to any 
 block drop quick proto tcp from any to any port = 0 
 block drop quick proto udp from any to any port = 0 
 block drop quick from snort2c to any label Block snort2c hosts 
 block drop quick from any to snort2c label Block snort2c hosts 
 anchor loopback all 
 pass in quick on lo0 all flags S/SA keep state label pass loopback 
 pass out quick on lo0 all flags S/SA keep state label pass loopback 
 anchor packageearly all 
 anchor carp all 
 pass quick inet proto icmp from 193.137.219.13 to any keep state 
 anchor dhcpserverlan all 
 pass in quick on bge1 inet proto udp from any port = bootpc to 
 255.255.255.255 port = bootps keep state label allow access to DHCP server 
 on LAN 
 pass in quick on bridge0 inet proto udp from any port = bootpc to 
 255.255.255.255 port = bootps keep state label allow access to DHCP server 
 on LAN 
 pass in quick on bge1 inet proto udp from any port = bootpc to 193.137.219.14 
 port = bootps keep state label allow access to DHCP server on LAN 
 pass in quick on bridge0 inet proto udp from any port = bootpc to 
 193.137.219.14 port = bootps keep state label allow access to DHCP server on 
 LAN 
 pass out quick on bge1 inet proto udp from 193.137.219.14 port = bootps to 
 any port = bootpc keep state label allow access to DHCP server on LAN 
 pass out quick on bridge0 inet proto udp from 193.137.219.14 port = bootps to 
 any port = bootpc keep state label allow access to DHCP server on LAN 
 pass in quick on bge0 proto udp from any port = bootps to any port = bootpc 
 keep state label allow dhcp client out wan 
 pass in quick on bridge0 proto udp from any port = bootps to any port = 
 bootpc keep state label allow dhcp client out wan 
 block drop in on ! bge1 inet from 193.137.219.0/28 to any 
 block drop in on bge1 inet6 from fe80::21e:c9ff:feba:a598 to any 
 block drop in inet from 193.137.219.14 to any 
 anchor spoofing all 
 anchor limitingesr all 
 block drop in quick from virusprot to any label virusprot overload table 
 pass out quick on bge1 proto icmp all keep state label let out anything from 
 firewall host itself 
 pass out quick on bridge0 proto icmp all keep state label let out anything 
 from firewall host itself 
 pass out quick on bge0 proto icmp all keep state label let out anything from 
 firewall host itself 
 pass out quick on bridge0 proto icmp all keep state label let out anything 
 from firewall host itself 
 pass out quick on bge0 all flags S/SA keep state (tcp.closed 5) label let 
 out anything from firewall host itself 
 anchor firewallout all 
 pass out quick on bge0 all flags S/SA keep state label let out anything from 
 firewall host itself 
 pass out quick on bge1 all flags S/SA keep state label let out anything from 
 firewall host itself 
 pass out quick on bridge0 all flags S/SA keep state label let out anything 
 from firewall host itself 
 pass out quick on enc0 all flags S/SA keep state label IPSEC internal host 
 to host 
 anchor anti-lockout all 
 pass in quick on bge1 inet from any to 193.137.219.14 flags S/SA keep state 
 label anti-lockout web rule 
 block drop in log proto tcp from sshlockout to any port = ssh label 
 sshlockout 
 anchor ftpproxy all 
 anchor pftpx/* all 
 pass in log quick on bge0 reply-to (bge0 193.137.219.2) inet all flags S/SA 
 keep state label USER_RULE: WLAN - LAN 
 pass in log quick on bridge0 reply-to (bge0 193.137.219.2) inet all flags 
 S/SA keep state label USER_RULE: WLAN - LAN 
 pass in log quick on bge1 all flags S/SA keep state label USER_RULE: Default 
 LAN - any 
 pass in log quick on bridge0 all flags S/SA keep state label USER_RULE: 
 Default LAN - any 
 pass in quick on bge1 inet proto tcp from any to 127.0.0.1 port = ftp-proxy 
 flags S/SA keep state label FTP PROXY: Allow traffic to localhost 
 pass in quick on bge1 inet proto tcp from any to 127.0.0.1 port = ftp flags 
 S/SA keep state label FTP 

[pfSense Support] LiveCD Serial Console Support?

2008-08-04 Thread [EMAIL PROTECTED]
I'm currently testing the pfSense LiveCD as a Recovery CD In case of a 
hard drive failure.


This is working about 99%, i just can't get the serial console to work 
on the LiveCD.


Searching around a little more, it appears the LiveCD /boot/loader.conf 
is not present and does not have the line console=comconsole to 
redirect console messages to the serial port. (I understand this is 
default behavior)


I've tried various ways of editing the ISO and adding a 
/boot/loader.conf file. The custom LiveCD will boot up, but never seems 
to read /boot/loader.conf, and seems to have trouble booting, hangs in 
random places (I think this is because of the ISO repackaging, Using 
MagicISO)


Has anyone edited the LiveCD for custom config.xml files or other 
tweaks? And if so, could you point me in the right direction.


Thanks,
Adam

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]