Netgate 2100 Security Gateway Manual
Netgate 2100 Security Gateway Manual
Netgate 2100 Security Gateway Manual
Netgate-2100
1 Getting Started 2
2 Initial Configuration 4
14 Switch Overview 72
15 Additional Resources 74
i
Security Gateway Manual Netgate-2100
This Quick Start Guide covers the first time connection procedures for the Netgate® 2100 Firewall Appliance. It will
provide the information needed to keep the appliance up and running.
Tip: Before getting started, a good practice is to download the PDF version of the Product Manual and the PDF version
of the pfSense Documentation in case Internet access is not available during setup.
ONE
GETTING STARTED
The basic firewall configuration begins with connecting the Netgate® appliance to the Internet. The Netgate appliance
should be unplugged at this time.
Connect one end of an Ethernet cable to the WAN port (shown in the Input and Output Ports section) of the Netgate
appliance. The other end of the same cable should be inserted into a LAN port on the ISP Customer Premise Equipment
(CPE) device, such as a cable or fiber router. If the CPE device provided by the ISP has multiple LAN ports, any LAN
port should work in most circumstances.
Next, connect one end of a second Ethernet cable to the LAN port (shown in the Input and Output Ports section) of the
Netgate appliance. Connect the other end to the computer.
2
Security Gateway Manual Netgate-2100
To connect to the GUI and configure the firewall in a browser, continue on to Initial Configuration.
To connect to the console and make adjustments before connecting to the GUI, see Connecting to the USB Console
Port.
Warning: The default IP Address on the LAN subnet on the Netgate firewall is 192.168.1.1/24. The same
subnet cannot be used on both WAN and LAN, so if the default IP address on the ISP-supplied modem is also
192.168.1.1/24, disconnect the WAN interface until the LAN interface on the firewall has been renumbered to
a different subnet (like 192.168.2.1/24) to avoid an IP Address conflict.
To change an interface IP address, choose option 2 from the Console Menu and walk through the steps to change
it, or from the GUI, go through the Setup Wizard (opens at first boot, also found at System > Setup Wizard) and
change the IP address on Step 5. Complete the Wizard and save the changes.
TWO
INITIAL CONFIGURATION
Plug the power cable into the power port (shown in the Input and Output Ports section) to turn on the Netgate® Firewall.
Allow 4 or 5 minutes to boot up completely.
Warning: If the ISP Customer Premise Equipment (CPE) on WAN (e.g. Fiber or Cable Router) has a default IP
Address of 192.168.1.1, disconnect the Ethernet cable from the WAN port on the Netgate 2100 Security Gateway
before proceeding.
Change the default LAN IP Address of the device during a later step in the configuration to avoid having conflicting
subnets on the WAN and LAN.
2. A warning message may appear. If this message or similar message is encountered, it is safe to proceed. Click
the Advanced Button and then click Proceed to 192.168.1.1 (unsafe) to continue.
3. At the Sign In page, enter the default pfSense® Plus username and password and click Next.
• Default Username: admin
• Default Password: pfsense
4
Security Gateway Manual Netgate-2100
This section steps through each page of the Setup Wizard to perform the initial configuration of the firewall. The wizard
collects information one page at a time but it does not make any changes to the firewall until the wizard is completed.
Tip: The wizard can be safely stopped at any time for those who wish to perform the configuration manually or restore
an existing backup (Backup and Restore).
To stop the wizard, navigate away from the wizard pages by clicking the logo in the upper left of the page or by choosing
an entry from one of the menus.
Note: Ignore the warning at the top of each wizard page about resetting the admin account password. One of the steps
in the Setup Wizard is to change the default password, but the new password is not applied until the end of the wizard.
DNS Servers
For purposes of this setup guide, use the Google public DNS servers (8.8.8.8 and 8.8.4.4).
Note: The firewall defaults to acting as a resolver and clients will not utilize these forwarding
DNS servers. However, these servers give the firewall itself a way to ensure it has working DNS
if resolving the default way does not work properly.
Default settings for the other items on this page should be acceptable for normal home users.
Default settings should be acceptable. Click Next.
6. Configuring LAN IP Address & Subnet Mask. The default LAN IP address of 192.168.1.1 and subnet mask
of 24 is usually sufficient.
Tip: If the CPE on WAN (e.g. Fiber or Cable Modem) has a default IP Address of 192.168.1.1, the Ethernet
cable should be disconnected from the WAN port on the Netgate 2100 Security Gateway before starting.
Change the default LAN IP Address of the device during this step in the configuration to avoid having conflicting
subnets on the WAN and LAN.
7. Change the Admin Password. Enter the same new password in both fields.
8. Click Reload to save the configuration.
9. After a few seconds, a message will indicate the Setup Wizard has completed. To proceed to the pfSense® Plus
dashboard, click Finish.
Note: This step of the wizard also contains several useful links to Netgate resources and methods of obtaining
assistance with the product. Be sure to read through the items on this page before finishing the wizard.
2.3 Finishing Up
After completing or exiting the wizard, during the first time loading the Dashboard the firewall will display a notifi-
cation modal dialog with the Copyright and Trademark Notices.
Read and click Accept to continue to the dashboard.
If the Ethernet cable was unplugged at the beginning of this configuration, reconnect it to the WAN port now.
This completes the basic configuration for the Netgate appliance.
THREE
This page provides an overview of the pfSense® Plus dashboard and navigation. It also provides information on how to
perform frequent tasks such as backing up the pfSense® Plus software and connecting to the Netgate firewall console.
pfSense® Plus software is highly configurable, all of which can be done through the dashboard. This orientation will
help to navigate and further configure the firewall.
Section 1
Important system information such as the model, Serial Number, and Netgate Device ID for this Netgate firewall.
Section 2
Identifies what version of pfSense® Plus software is installed, and if an update is available.
Section 3
Describes Netgate Service and Support.
11
Security Gateway Manual Netgate-2100
Section 4
Shows the various menu headings. Each menu heading has drop-down options for a wide range of configuration
choices.
It is important to backup the firewall configuration prior to updating or making any configuration changes. From the
menu at the top of the page, browse to Diagnostics > Backup/Restore.
Click Download configuration as XML and save a copy of the firewall configuration to the computer connected to
the Netgate firewall.
This backup (or any backup) can be restored from the same screen by choosing the backed up file under Restore
Configuration.
Note: Auto Config Backup is a built-in service located at Services > Auto Config Backup. This service will save
up to 100 encrypted backup files automatically, any time a change to the configuration has been made. Visit the Auto
Config Backup page for more information.
There are times when accessing the console is required. Perhaps GUI console access has been locked out, or the
password has been lost or forgotten.
See also:
Connecting to the USB Console Port. Cable is required.
Tip: To learn more about getting the most out of a Netgate appliance, sign up for a pfSense Plus Software Training
course or browse the extensive Resource Library.
3.5 Updates
When a new version of pfSense Plus software is available, the device will indicate the availability of the new version
on the System Information dashboard widget. Users can peform a manual check as well by visiting System > Update.
Users can initiate an upgrade from the System > Update page as needed.
For more information, see the Upgrade Guide.
Warning: Some older installations of pfSense Plus software on Netgate 2100 and Netgate 2100 MAX devices
contain an EFI partition which does not have sufficient space to accommodate the new EFI loader for version 23.01
and later. This primarily affects UFS-based systems initially installed with version 21.02-p1 or before.
For details, see Troubleshooting Upgrades on Netgate 1100 and Netgate 2100 Devices.
FOUR
The WAN Combo-Port is shared between an RJ-45 port and an SFP port. Only one port can be used.
15
Security Gateway Manual Netgate-2100
The four LAN Ethernet ports are switched ports. By default all of these ports act as a single switch uplinked to the
LAN interface on the firewall.
Note: For more details on how the switch operates, see Switch Overview.
For instructions on how to configure the switch see Configuring the Switch Ports.
Warning: The LAN ports do not support the Spanning Tree Protocol (STP). Two or more ports connected to
another Layer 2 switch, or connected to 2 or more different interconnected switches, could create a flooding loop
between the switches. This can cause the router to stop functioning until the loop is resolved.
Note: The reset button is only used to reset the system back to factory defaults. It does not respond when pushed
while the system is running. See Factory Reset Procedure.
USB Ports
FIVE
Warning: Do not use this product in location that can be submerged by water.
Warning: Do not use this product during an electrical storm to avoid electrical shock.
1. Compliance is required with respect to voltage, frequency, and current requirements indicated on the manu-
facturer’s label. Connection to a different power source than those specified may result in improper operation,
damage to the equipment or pose a fire hazard if the limitations are not followed.
2. There are no operator serviceable parts inside this equipment. Service should be provided only by a qualified
service technician.
3. This equipment is provided with a detachable power cord which has an integral safety ground wire intended for
connection to a grounded safety outlet.
a) Do not substitute the power cord with one that is not the provided approved type. If a 3 prong plug is
provided, never use an adapter plug to connect to a 2-wire outlet as this will defeat the continuity of the
grounding wire.
b) The equipment requires the use of the ground wire as a part of the safety certification, modification or
misuse can provide a shock hazard that can result in serious injury or death.
c) Contact a qualified electrician or the manufacturer if there are questions about the installation prior to
connecting the equipment.
d) Protective grounding/earthing is provided by Listed AC adapter. Building installation shall provide appro-
priate short-circuit backup protection.
e) Protective bonding must be installed in accordance with local national wiring rules and regulations.
18
Security Gateway Manual Netgate-2100
Warning: To help protect your Netgate appliance from sudden, transient increases and decreases in electrical
power, use a surge suppressor, line conditioner, uninterruptible power supply (UPS) or a combination of those
devices.
Failure to take such precautions could result in premature failure, and/or damage to your Netgate appliance, which is
not covered under the product warranty. Such an event may also present the risk of electric shock, fire, or explosion.
Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority
to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following
two conditions:
1. This device may not cause harmful interference, and
2. This device must accept any interference received, including interference that may cause undesired operation.
Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a residential environment.
This Class B digital apparatus complies with Canadian ICES-3(B). Cet appareil numérique de la classe B est conforme
à la norme NMB-3(B) Canada.
This is a AMC Compliance level 2 product. This product is suitable for domestic environments.
5.6 CE Marking
CE marking on this product represents the product is in compliance with all directives that are applicable to it.
5.7.1 English
European Directive 2002/96/EC requires that the equipment bearing this symbol on the product and/or its packaging
must not be disposed of with unsorted municipal waste. The symbol indicates that this product should be disposed
of separately from regular household waste streams. It is your responsibility to dispose of this and other electric and
electronic equipment via designated collection facilities appointed by the government or local authorities. Correct
disposal and recycling will help prevent potential negative consequences to the environment and human health. For
more detailed information about the disposal of your old equipment, please contact your local authorities, waste disposal
service, or the shop where you purchased the product.
5.7.2 Deutsch
Die Europäische Richtlinie 2002/96/EC verlangt, dass technische Ausrüstung, die direkt am Gerät und/oder an der
Verpackung mit diesem Symbol versehen ist, nicht zusammen mit unsortiertem Gemeindeabfall entsorgt werden darf.
Das Symbol weist darauf hin, dass das Produkt von regulärem Haushaltmüll getrennt entsorgt werden sollte. Es liegt in
Ihrer Verantwortung, dieses Gerät und andere elektrische und elektronische Geräte über die dafür zuständigen und von
der Regierung oder örtlichen Behörden dazu bestimmten Sammelstellen zu entsorgen. Ordnungsgemäßes Entsorgen
und Recyceln trägt dazu bei, potentielle negative Folgen für Umwelt und die menschliche Gesundheit zu vermeiden.
Wenn Sie weitere Informationen zur Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an die örtlichen
Behörden oder städtischen Entsorgungsdienste oder an den Händler, bei dem Sie das Produkt erworben haben.
5.7.3 Español
La Directiva 2002/96/CE de la UE exige que los equipos que lleven este símbolo en el propio aparato y/o en su embalaje
no deben eliminarse junto con otros residuos urbanos no seleccionados. El símbolo indica que el producto en cuestión
debe separarse de los residuos domésticos convencionales con vistas a su eliminación. Es responsabilidad suya desechar
este y cualesquiera otros aparatos eléctricos y electrónicos a través de los puntos de recogida que ponen a su disposición
el gobierno y las autoridades locales. Al desechar y reciclar correctamente estos aparatos estará contribuyendo a evitar
posibles consecuencias negativas para el medio ambiente y la salud de las personas. Si desea obtener información más
detallada sobre la eliminación segura de su aparato usado, consulte a las autoridades locales, al servicio de recogida y
eliminación de residuos de su zona o pregunte en la tienda donde adquirió el producto.
5.7.4 Français
La directive européenne 2002/96/CE exige que l’équipement sur lequel est apposé ce symbole sur le produit et/ou son
emballage ne soit pas jeté avec les autres ordures ménagères. Ce symbole indique que le produit doit être éliminé dans
un circuit distinct de celui pour les déchets des ménages. Il est de votre responsabilité de jeter ce matériel ainsi que
tout autre matériel électrique ou électronique par les moyens de collecte indiqués par le gouvernement et les pouvoirs
publics des collectivités territoriales. L’élimination et le recyclage en bonne et due forme ont pour but de lutter contre
l’impact néfaste potentiel de ce type de produits sur l’environnement et la santé publique. Pour plus d’informations sur
le mode d’élimination de votre ancien équipement, veuillez prendre contact avec les pouvoirs publics locaux, le service
de traitement des déchets, ou l’endroit où vous avez acheté le produit.
5.7.5 Italiano
La direttiva europea 2002/96/EC richiede che le apparecchiature contrassegnate con questo simbolo sul prodotto e/o
sull’imballaggio non siano smaltite insieme ai rifiuti urbani non differenziati. Il simbolo indica che questo prodotto non
deve essere smaltito insieme ai normali rifiuti domestici. È responsabilità del proprietario smaltire sia questi prodotti
sia le altre apparecchiature elettriche ed elettroniche mediante le specifiche strutture di raccolta indicate dal governo o
dagli enti pubblici locali. Il corretto smaltimento ed il riciclaggio aiuteranno a prevenire conseguenze potenzialmente
negative per l’ambiente e per la salute dell’essere umano. Per ricevere informazioni più dettagliate circa lo smaltimento
delle vecchie apparecchiature in Vostro possesso, Vi invitiamo a contattare gli enti pubblici di competenza, il servizio
di smaltimento rifiuti o il negozio nel quale avete acquistato il prodotto.
5.8.1 Česky[Czech]
NETGATE tímto prohla uje, e tento NETGATE device, je ve shod se základními po adavky a dal ími p íslu n mi
ustanoveními sm rnice 1999/5/ES.
Undertegnede NETGATE erklærer herved, at følgende udstyr NETGATE device, overholder de væsentlige krav og
øvrige relevante krav i direktiv 1999/5/EF.
Hierbij verklaart NETGATE dat het toestel NETGATE device, in overeenstemming is met de essentiële eisen en de
andere relevante bepalingen van richtlijn 1999/5/EG. Bij deze verklaart NETGATE dat deze NETGATE device, voldoet
aan de essentiële eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/EC.
5.8.4 English
Hereby, NETGATE , declares that this NETGATE device, is in compliance with the essential requirements and other
relevant provisions of Directive 1999/5/EC.
Käesolevaga kinnitab NETGATE seadme NETGATE device, vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud
direktiivist tulenevatele teistele asjakohastele sätetele.
NETGATE vakuuttaa täten että NETGATE device, tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten
ja sitä koskevien direktiivin muiden ehtojen mukainen. Français [French] Par la présente NETGATE déclare que
l’appareil Netgate, device est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive
1999/5/CE.
Hiermit erklärt Netgate, dass sich diese NETGATE device, in Übereinstimmung mit den grundlegenden Anforderungen
und den anderen relevanten Vorschriften der Richtlinie 1999/5/EG befindet”. (BMWi)
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ NETGATE ΔΗΛΩΝΕΙ ΟΤΙ NETGATE device, ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙ-
ΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1995/5/ΕΚ.
Alulírott, NETGATE nyilatkozom, hogy a NETGATE device, megfelel a vonatkozó alapvetõ követelményeknek és az
1999/5/EC irányelv egyéb elõírásainak.
Hér me l sir NETGATE yfir ví a NETGATE device, er í samræmi vi grunnkröfur og a rar kröfur, sem ger ar eru í
tilskipun 1999/5/EC.
Con la presente NETGATE dichiara che questo NETGATE device, è conforme ai requisiti essenziali ed alle altre
disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Ar o NETGATE deklar , ka NETGATE device, atbilst Direkt vas 1999/5/EK b tiskaj m pras b m un citiem ar to saist
tajiem noteikumiem.
NETGATE deklaruoja, kad šis NETGATE ˛irenginys atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos
nuostatas.
Hawnhekk, Netgate, jiddikjara li dan NETGATE device, jikkonforma mal- ti ijiet essenzjali u ma provvedimenti o rajn
relevanti li hemm fid-Dirrettiva 1999/5/EC.
NETGATE erklærer herved at utstyret NETGATE device, er i samsvar med de grunnleggende krav og øvrige relevante
krav i direktiv 1999/5/EF.
NETGATE t mto vyhlasuje, e NETGATE device, sp a základné po iadavky a v etky príslu né ustanovenia Smernice
1999/5/ES.
Härmed intygar NETGATE att denna NETGATE device, står I överensstämmelse med de väsentliga egenskapskrav
och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG.
Por medio de la presente NETGATE declara que el NETGATE device, cumple con los requisitos esenciales y cua-
lesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE.
Niniejszym, firma NETGATE o wiadcza, e produkt serii NETGATE device, spełnia zasadnicze wymagania i inne
istotne postanowienia Dyrektywy 1999/5/EC.
NETGATE declara que este NETGATE device, está conforme com os requisitos essenciais e outras disposições da
Directiva 1999/5/CE.
Prin prezenta, NETGATE declară că acest dispozitiv NETGATE este în conformitate cu cerint, ele esent, iale s, i alte
prevederi relevante ale Directivei 1999/5/CE.
5.9 Disputes
ANY DISPUTE OR CLAIM RELATING IN ANY WAY TO YOUR USE OF ANY PRODUCTS/SERVICES, OR
TO ANY PRODUCTS OR SERVICES SOLD OR DISTRIBUTED BY RCL OR ESF WILL BE RESOLVED BY
BINDING ARBITRATION IN AUSTIN, TEXAS, RATHER THAN IN COURT. The Federal Arbitration Act and
federal arbitration law apply to this agreement.
THERE IS NO JUDGE OR JURY IN ARBITRATION, AND COURT REVIEW OF AN ARBITRATION AWARD
IS LIMITED. HOWEVER, AN ARBITRATOR CAN AWARD ON AN INDIVIDUAL BASIS THE SAME DAM-
AGES AND RELIEF AS A COURT (INCLUDING INJUNCTIVE AND DECLARATORY RELIEF OR STATU-
TORY DAMAGES), AND MUST FOLLOW THE TERMS OF THESE TERMS AND CONDITIONS OF USE AS A
COURT WOULD.
To begin an arbitration proceeding, you must send a letter requesting arbitration and describing your claim to the
following:
The arbitration will be conducted by the American Arbitration Association (AAA) under its rules. The AAA’s rules
are available at www.adr.org. Payment of all filing, administration and arbitrator fees will be governed by the AAA’s
rules.
We each agree that any dispute resolution proceedings will be conducted only on an individual basis and not in a class,
consolidated or representative action. We also both agree that you or we may bring suit in court to enjoin infringement
or other misuse of intellectual property rights.
By using any Products/Services, you agree that the Federal Arbitration Act, applicable federal law, and the laws of
the state of Texas, without regard to principles of conflict of laws, will govern these terms and conditions of use and
any dispute of any sort that might arise between you and RCL and/or ESF. Any claim or cause of action concerning
these terms and conditions or use of the RCL and/or ESF website must be brought within one (1) year after the claim
or cause of action arises. Exclusive jurisdiction and venue for any dispute or claim arising out of or relating to the
parties’ relationship, these terms and conditions, or the RCL and/or ESF website, shall be with the arbitrator and/or
courts located in Austin, Texas. The judgment of the arbitrator may be enforced by the courts located in Austin, Texas,
or any other court having jurisdiction over you.
Please review our other policies, such as our pricing policy, posted on our websites. These policies also govern your
use of Products/Services. We reserve the right to make changes to our site, policies, service terms, and these terms and
conditions of use at any time.
5.12 Miscellaneous
If any provision of these terms and conditions of use, or our terms and conditions of sale, are held to be invalid, void
or unenforceable, the invalid, void or unenforceable provision shall be modified to the minimum extent necessary in
order to render it valid or enforceable and in keeping with the intent of these terms and conditions. If such modification
is not possible, the invalid or unenforceable provision shall be severed, and the remaining terms and conditions shall
be enforced as written. Headings are for reference purposes only and in no way define, limit, construe or describe the
scope or extent of such section. Our failure to act with respect to a breach by you or others does not waive our right
to act with respect to subsequent or similar breaches. These terms and conditions set forth the entire understanding
and agreement between us with respect to the subject matter hereof, and supersede any prior oral or written agreement
pertaining thereto, except as noted above with respect to any conflict between these terms and conditions and our reseller
agreement, if the latter is applicable to you.
SIX
The Netgate 2100 has built in wall-mount keyholes on the bottom of the appliance. This page provides an overview
and a PDF template for attaching the system to the wall.
26
Security Gateway Manual Netgate-2100
The Netgate 2100 can be mounted vertically or horizontally. If mounted horizontally, the ports and cables should face
up to reduce the pull from the weight of the cables on the ports. Click on the button below to download the Wall Mount
Template.
Print the template out at 100% Scale for it to be accurate.
Note: The 100% Scale setting varies by printer manufacturer and model.
Verify the distance between holes is 5.5 inches or 140 mm (14 cm) before placing the anchors in the wall.
Follow the pictured instructions on the PDF to complete the wall mount installation.
SEVEN
This guide shows how to access the serial console which can be used for troubleshooting and diagnostics tasks as well
as some basic configuration.
There are times when directly accessing the console is required. Perhaps GUI or SSH access has been locked out, or
the password has been lost or forgotten.
A Silicon Labs CP210x USB-to-UART Bridge driver is used to provide access to the console, which is exposed via
the USB Mini-B (5-pin) port on the appliance.
If needed, install an appropriate Silicon Labs CP210x USB to UART Bridge driver on the workstation used to connect
with the device.
Windows
There are drivers available for Windows available for download.
macOS
There are drivers available for macOS available for download.
For macOS, choose the CP210x VCP Mac download.
Linux
There are drivers available for Linux available for download.
FreeBSD
Recent versions of FreeBSD include this driver and will not require manual installation.
29
Security Gateway Manual Netgate-2100
Next, locate an appropriate USB cable that has a USB Mini-B (5-pin) connector on one end and a regular USB Type
A plug on the other end. These cables are commonly used with smaller USB peripherals such as GPS units, cameras,
and so on.
Gently push the USB Mini-B (5-pin) plug end into the console port on the appliance and connect the USB Type A
plug into an available USB port on the workstation.
Tip: Be certain to gently push in the USB Mini-B (5-pin) connector on the device side completely. With most cables
there will be a tangible “click”, “snap”, or similar indication when the cable is fully engaged.
On some devices when using a USB serial console port the serial port will not appear on the client operating system
until the device is plugged into a power source.
If the client OS does not see the serial device, connect the power cord to the device to allow it to start booting.
If the device appears without power, then better to wait until the terminal is open before connecting power so the client
can view the entire boot output.
The appropriate console port device that the workstation assigned as the serial port must be located before attempting
to connect to the console.
Note: Even if the serial port was assigned in the BIOS, the workstation OS may remap it to a different COM Port.
Windows
To locate the device name on Windows, open Device Manager and expand the section for Ports (COM & LPT).
Look for an entry with a title such as Silicon Labs CP210x USB to UART Bridge. If there is a label in the name that
contains “COMX” where X is a decimal digit (e.g. COM3), that value is what would be used as the port in the terminal
program.
macOS
The device associated with the system console is likely to show up as, or start with, /dev/cu.usbserial-<id>.
Run ls -l /dev/cu.* from a Terminal prompt to see a list of available USB serial devices and locate the appropriate
one for the hardware. If there are multiple devices, the correct device is likely the one with the most recent timestamp
or highest ID.
Linux
The device associated with the system console is likely to show up as /dev/ttyUSB0. Look for messages about the
device attaching in the system log files or by running dmesg.
Note: If the device does not appear in /dev/, see the note above in the driver section about manually loading the
Linux driver and then try again.
FreeBSD
The device associated with the system console is likely to show up as /dev/cuaU0. Look for messages about the device
attaching in the system log files or by running dmesg.
Note: If the serial device is not present, ensure the device has power and then check again.
Use a terminal program to connect to the system console port. Some choices of terminal programs:
Windows
For Windows the best practice is to run PuTTY in Windows or SecureCRT. An example of how to configure PuTTY is
below.
macOS
For macOS the best practice is to run GNU screen, or cu. An example of how to configure GNU screen is below.
Linux
For Linux the best practices are to run GNU screen, PuTTY in Linux, minicom, or dterm. Examples of how to
configure PuTTY and GNU screen are below.
FreeBSD
For FreeBSD the best practice is to run GNU screen or cu. An example of how to configure GNU screen is below.
PuTTY in Windows
• Open PuTTY and select Session under Category on the left hand side.
• Set the Connection type to Serial
• Set Serial line to the console port determined previously
• Set the Speed to 115200 bits per second.
• Click the Open button
PuTTY will then display the console.
PuTTY in Linux
Note: The sudo command will prompt for the local workstation password of the current account.
GNU screen
In many cases screen may be invoked simply by using the proper command line, where <console-port> is the
console port that was located above.
Note: The sudo command will prompt for the local workstation password of the current account.
If portions of the text are unreadable but appear to be properly formatted, the most likely culprit is a character encoding
mismatch in the terminal. Adding the -U parameter to the screen command line arguments forces it to use UTF-8 for
character encoding:
Terminal Optimization
Beyond the required settings there are additional options in terminal programs which will help input behavior and
output rendering to ensure the best experience. These settings vary location and support by client, and may not be
available in all clients or terminals.
These are:
Terminal Type
xterm
This setting may be under Terminal, Terminal Emulation, or similar areas.
Color Support
ANSI colors / 256 Color / ANSI with 256 Colors
This setting may be under Terminal Emulation, Window Colors, Text, Advanced Terminfo, or similar
areas.
Character Set / Character Encoding
UTF-8
This setting may be under Terminal Appearance, Window Translation, Advanced International, or
similar areas. In GNU screen this is activated by passing the -U parameter.
Line Drawing
Look for and enable setting such as “Draw lines graphically”, “Use unicode graphics characters”,
and/or “Use Unicode line drawing code points”.
These settings may be under Terminal Appearance, Window Translation, or similar areas.
Function Keys / Keypad
Xterm R6
In Putty this is under Terminal > Keyboard and is labeled The Function Keys and Keypad.
Font
For the best experience, use a modern monospace unicode font such as Deja Vu Sans Mono, Liber-
ation Mono, Monaco, Consolas, Fira Code, or similar.
This setting may be under Terminal Appearance, Window Appearance, Text, or similar areas.
After connecting a terminal client, it may not immediately see any output. This could be because the device has already
finished booting or it may be that the device is waiting for some other input.
If the device does not yet have power applied, plug it in and monitor the terminal output.
If the device is already powered on, try pressing Space. If there is still no output, press Enter. If the device was
booted, it may redisplay the console menu or login prompt, or produce other output indicating its status.
From the console, a variety of things are possible, such as changing interface addresses. There is a full explanation of
every console menu option in the pfSense software documentation.
7.7 Troubleshooting
With a USB serial console there are a few reasons why the serial port may not be present in the client operating system,
including:
No Power
Some models require power before the client can connect to the USB serial console.
USB Cable Not Plugged In
For USB consoles, the USB cable may not be fully engaged on both ends. Gently, but firmly, ensure the cable
has a good connection on both sides.
Bad USB Cable
Some USB cables are not suitable for use as data cables. For example, some cables are only capable of delivering
power for charging devices and not acting as data cables. Others may be of low quality or have poor or worn
connectors.
The ideal cable to use is the one that came with the device. Failing that, ensure the cable is of the correct type
and specifications, and try multiple cables.
Wrong Device
In some cases there may be multiple serial devices available. Ensure the one used by the serial client is the correct
one. Some devices expose multiple ports, so using the incorrect port may lead to no output or unexpected output.
Hardware Failure
There could be a hardware failure preventing the serial console from working. Contact Netgate TAC for assis-
tance.
PuTTY generally handles most cases OK but can have issues with line drawing characters on certain platforms.
These settings seem to work best (tested on Windows):
Window
Columns x Rows
80x24
Window > Appearance
Font
Courier New 10pt or Consolas 10pt
Window > Translation
Remote Character Set
Use font encoding or UTF-8
Handling of line drawing characters
Use font in both ANSI and OEM modes or Use Unicode line drawing code points
Window > Colours
Indicate bolded text by changing
The colour
If the serial output appears to be garbled, missing characters, binary, or random characters check the following items:
Flow Control
In some cases flow control can interfere with serial communication, causing dropped characters or other issues.
Disabling flow control in the client can potentially correct this problem.
On PuTTY and other GUI clients there is typically a per-session option to disable flow control. In PuTTY, the
Flow Control option is in the settings tree under Connection, then Serial.
To disable flow control in GNU Screen, add the -ixon and/or -ixoff parameters after the serial speed as in the
following example:
Terminal Speed
Ensure the terminal program is configured for the correct speed. (See No Serial Output)
Character Encoding
Ensure the terminal program is configured for the proper character encoding, such as UTF-8 or Latin-1, depend-
ing on the operating system. (See GNU Screen)
If serial output is shown for the BIOS but stops afterward, check the following items:
Terminal Speed
Ensure the terminal program is configured for the correct speed for the installed operating system. (See No Serial
Output)
Device OS Serial Console Settings
Ensure the installed operating system is configured to activate the serial console and that it is configured for
the proper console (e.g. ttyS1 in Linux). Consult the various operating install guides on this site for further
information.
Bootable Media
If booting from a USB flash drive, ensure that the drive was written correctly and contains a bootable operating
system image.
EIGHT
This guide uses the Netgate Installer to install pfSense® Plus software on a Netgate 2100 device.
Note: pfSense® Plus is preinstalled on Netgate appliances. It is optimally tuned for Netgate hardware and contains
features that cannot be found elsewhere, such as ZFS Boot Environments, OpenVPN DCO, Built-in IPFIX Export, and
the AWS VPC Wizard.
The Netgate Installer can be downloaded from the Netgate Store using a Netgate Store Account.
See also:
For a more detailed walkthrough of the download process, see Download Installation Media in the pfSense Software
Documentation.
The image to download for this device is:
netgate-installer-aarch64.img.gz
The installation process is interactive and utilizes the console. Follow the directions under Connect to the console to
configure and use the console.
39
Security Gateway Manual Netgate-2100
1. Insert the memstick into the USB port and boot the system.
Tip: The best practice is to connect to the console, turn off the device gracefully by using the Halt system
option from the console and removing power once the shutdown procedure completes, then insert the USB
memstick and boot the device.
Starting the recovery process requires interrupting the boot process very soon after the boot process begins, so
having an active console connection before booting is important.
During the installation process the installer will prompt to select a target drive. The installer will then write pfSense®
Plus to the chosen drive. In most cases a device will have only one potential target drive.
• On devices with only MMC storage, the only choice is mmcsd0.
• On devices with multiple drives, such as MAX variants, take care to choose the correct intended target. The
correct choice is always going to be the M.2 SATA storage (ada0).
The installer will automatically launch and present several options. On Netgate appliances, choosing Enter for the
default options will complete the installation process in most cases.
Tip: There are options on the Welcome screen of the installer which can recover configuration data from a previous
installation or from a USB drive.
See also:
For a complete walkthrough of the installation process, see Installation Walkthrough.
When the installation is complete, remove the USB drive from the USB port.
Important: If the USB drive remains attached, the device may boot into the installer again.
See also:
For information on restoring from a previously saved configuration, go to Backup and Restore.
Caution: If this device contains multiple disks, such as when adding an SSD to an existing system which pre-
viously used MMC, additional steps may be necessary to ensure the device boots from and uses the correct disk.
Furthermore, having separate installations of the software on different disks is a known source of problems. For
example, the kernel could boot from one disk while the root filesystem is loaded from another, or they could contain
conflicting ZFS pools.
In some cases it is possible to adjust the BIOS boot order to prefer the new disk, but the best practice is to wipe the
old disk to remove any chance of the previous installation causing boot issues or conflicts.
For information on how to wipe the old disk, see Multiple Disk Boot Issues.
NINE
The Netgate® 2100 has built-in onboard eMMC storage. Optionally, a M.2 SATA drive could be installed as an upgrade
or to bypass the onboard eMMC flash memory.
Note: pfSense® Plus software must be reinstalled on the M.2 SATA drive. By default, the M.2 SATA drive will then
be the first drive recognized by pfSense® Plus software.
The Netgate 2100 has one slot capable of installing an optional M.2 SATA drive.
The connector is for a 2242 (22mm x 42mm) M.2 SATA only.
Warning: The 42mm standoff cannot be moved without disconnecting the thermal paste between the processor
and the heat sink. This is not supported and may void the warranty.
1. Turn the system over carefully to avoid scratching the top of the system. Remove the four (4) T10 Torx screws
as indicated below.
43
Security Gateway Manual Netgate-2100
2. Turn system upright and carefully remove the cover. Set the cover off to the side and keep it upright so the top is
not scratched. Identify where the M.2 SATA drive slot is located and remove the screw from the standoff.
Note: If the standoff turns while attempting to remove the screw, hold the standoff with a fine pair of needle-
nosed pliers.
3. After the screw has been removed, insert the M.2 SATA drive into the slot at about a 30° angle.
Warning: The M.2 SATA card is keyed. Do not force it into the slot.
4. Gently push down the M.2 SATA card and replace the screw into the standoff.
5. Place the cover back on and turn the Netgate 2100 over. Replace the four (4) T10 Torx case screws. Be careful
not to crossthread the screws or overtighten them.
6. Reinstall the pfSense® Plus software on the new M.2 SATA drive.
See also:
Reinstalling pfSense Plus Software
1. Restore the configuration backup if one is available.
See also:
For information on restoring from a previously saved configuration, see Backup and Restore.
Tip: If the new drive is compatible with S.M.A.R.T. it may be possible to view detailed drive status information and
run tests from Diagnostics > S.M.A.R.T. Status.
TEN
This optional guide shows the steps required to configure the 4 switched Ethernet ports as discrete ports.
The following attributes are used in this configuration guide but can be changed to suit other requirements:
• Netgate 2100 Ethernet Port: LAN4
• IP Address Assignment: 192.168.100.1/24
• VLAN Tag: 4084 (VLAN tags should be 4081-4084 for LAN Ports 1-4)
Note: When connecting to the GUI, do NOT connect to any port being configured during this procedure or the device
will lose connectivity to the GUI.
48
Security Gateway Manual Netgate-2100
6. Set the VLAN Tag to 4084. Type Lan port 4 as the Description. Click Save.
Note: This guide uses 4084 as an example. The value for the tags must be unique for each VLAN and must be
between 1 and 4094. Avoid using values that are already in use. Best practice is not to use 1.
Click on + Add.
9. Click on OPT1. This is the Interface that matches the new VLAN being created.
12. Scroll down and make the IPv4 Address 192.168.100.1/24 (in this example).
16. Go to the VLANs tab. Click in the Enable 802.1q VLAN mode check-box and click Save.
18. Type 4084 for the VLAN Tag and 4 for Member(s). This represents LAN4 (port 4) and tagged should be
unchecked.
19. Click + Add Member to add the LAN Uplink, 5. This member should be tagged as shown.
22. Click Delete beside Member(s) 4. This will remove LAN4 from this VLAN group.
25. Click on Port VID 1 beside LAN4. Backspace through 1 and insert 4084, the new VLAN ID.
ELEVEN
Note: By default the Netgate 2100 is not configured with OPT interfaces. To reconfigure one or more of the LAN
switch ports as an OPT interface, see Switch Overview.
This guide configures an OPT port as an additional WAN type interface. These interfaces connect to upstream networks
providing connectivity to the Internet or other remote destinations.
See also:
Multi-WAN documentation
• Requirements
• Assign the Interface
• Interface Configuration
• Outbound NAT
– Automatic or Hybrid Outbound NAT
– Manual Outbound NAT
• Firewall Rules
• Gateway Groups
• DNS
• Setup Policy Routing
• Dynamic DNS
• VPN Considerations
• Testing
54
Security Gateway Manual Netgate-2100
11.1 Requirements
• This guide assumes the underlying interface is already present (e.g. physical port, VLAN, etc).
• The WAN configuration type and settings must be known before starting. For example, this might be an IP
address, subnet mask, and gateway value for static addresses or credentials for PPPoE.
• Click Add
The firewall will assign the next available OPT interface number corresponding to the internal interface designation.
For example, if there are no current OPT interfaces, the new interface will be OPT1. The next will be OPT2, and so
on.
Note: As this guide does not know what that number will be on a given configuration, it will refer to the interface
generically as OPTx and the customized name WAN2.
The newly assigned interface will have its own entry under the Interfaces menu and elsewhere in the GUI.
Gateway IPv4
The IPv4 address of the gateway inside the same subnet.
Description
Optional text describing the purpose of the gateway.
– Click Add
– Ensure the new gateway is selected as the IPv4 Upstream Gateway
• Check Block private networks
This will block private network traffic on the interface, though if the firewall rules for this WAN are not permis-
sive, this may be unnecessary.
• Check Block bogon networks
This will traffic from bogus or unassigned networks on the interface, though if the firewall rules for this WAN
are not permissive, this may be unnecessary.
• Click Save
• Click Apply Changes
The presence of a selected gateway in the interface configuration causes the firewall to treat the interface as a WAN type
interface. This is manual for static configurations, as above, but is automatic for dynamic WANs (e.g. DHCP, PPPoE).
The firewall applies outbound NAT to traffic exiting WAN type interfaces but does not use WAN type interface networks
as a source for outbound NAT on other interfaces. Firewall rules on WAN type interfaces get reply-to added to ensure
traffic entering a WAN exits the same WAN, and traffic exiting the interface is nudged toward its gateway. The DNS
Resolver will not accept queries from clients on WAN type interfaces without manual ACL entries.
See also:
Interface Configuration
For clients on local interfaces to reach the Internet from private addresses to destinations through this WAN, the firewall
must apply Outbound NAT on traffic leaving this new WAN.
• Navigate to Firewall > NAT, Outbound tab
• Check the current outbound NAT mode and follow the section below which matches the mode.
If the mode is set to Automatic or Hybrid, then this may not need further configuration.
Ensure there are rules for the new WAN listed as a Interface in the Automatic Rules at the bottom of the page. If so,
skip ahead to the next section to configure Firewall Rules.
If the mode is set to Manual, create a new rule or set of rules to cover the new WAN.
If there are existing rules in the Mappings table, they can be copied and adjusted to use the new WAN. Otherwise,
create them manually:
By default there are no rules on the new interface, so the firewall will block all traffic. This is ideal for a WAN, so is
safe to leave as-is. Adding services on the new WAN, such as VPNs, may require rules but those should be handled on
a case-by-case basis.
Warning: Do not add any blanket “allow all” style rules on any WAN.
Gateway Groups do not control traffic directly, but can be used in other places, such as firewall rules and service
bindings, to influence how those areas use gateways.
For most scenarios it helps to create three gateway groups to start with: PreferWAN, PreferWAN2, and LoadBalance:
• Navigate to System > Routing, Gateway Groups tab
Note: Rules using this group enable connection-based load balancing, not per-packet load balancing.
Rules using this group will also have failover style behavior as WANs which are down are removed from load
balancing.
• Click Save
• Click Apply Changes
Note: This is important for failover from the firewall itself so it always has outbound access. While this also enables
basic failover for client traffic, it’s better to use policy routing rules to control client traffic behavior.
11.7 DNS
DNS is critical for Internet access and it is important to ensure the firewall can always resolve hostnames using DNS
even when running on a secondary WAN.
The needs here depend upon the configuration of the DNS Resolver or Forwarder.
If the DNS Resolver is in its default resolver mode, then default gateway switching will be sufficient to handle failover
in most cases, though it may not be as reliable as using forwarding mode.
If the DNS Resolver is in forwarding mode or the firewall is using the DNS Forwarder instead, then maintaining
functional DNS requires manually configuring gateways for forwarding DNS servers.
• Navigate to System > General Setup
• Add at least one DNS server for each WAN in the DNS Server Settings section, ideally two or more. Click
Add DNS Server to create additional rows.
Each entry should be configured as follows:
Address
The IP address of a DNS server.
Each server address must be unique, the same server cannot be listed more than once.
DNS Hostname
Leave this field blank unless the server will be contacted using DNS over TLS through the DNS
Resolver. In this case, enter the FQDN of the DNS server so its name can be validated against its
TLS certificate.
Gateway
Select a gateway for each DNS server, corresponding to the WAN through which the firewall can
reach the DNS server.
For public DNS servers such as CloudFlare or Google, either WAN is OK, but if either WAN
uses DNS servers from a specific ISP, ensure those exit the appropriate WAN.
Note: If the gateway drop-down does not appear next to each DNS server, then the firewall does
not have more than one gateway configured for any address family. Double check the gateway
settings for all WAN interfaces.
This will tell the firewall to use the DNS servers entered on this page and to ignore servers provided by dynamic
WANs such as DHCP or PPPoE. Occasionally these providers may push conflicting DNS server information so
the best practice is to assign the DNS servers manually.
• Click Save
Note: If the DNS Resolver has specific outgoing interfaces selected in its configuration, select the new WAN there
well as well.
Policy routing involves setting a gateway on firewall rules which direct matching traffic out specific WANs or failover
groups.
In simple cases (one LAN, no VPNs) the only requirement to configure policy routing is to add a gateway to existing
rules.
• Navigate to Firewall > Rules, LAN tab
• Edit the default pass rule for the LAN
• Click Display Advanced
• Set the Gateway to one of the gateway groups based on the desired LAN client behavior.
For example, pick PreferWAN so clients use WAN and then if WAN fails, they use WAN2.
• Click Save
• Click Apply Changes
If there are other local networks or VPNs which clients on LAN must reach, add rules above the default pass rules to
pass local traffic without a gateway set:
• Navigate to Firewall > Rules, LAN tab
• Click Save
• Click Apply Changes
Dynamic DNS provides several benefits for multiple WANs, particularly with VPNs. If the firewall does not already
have one or more Dynamic DNS hostnames configured, consider signing up with a provider and creating one or more.
It is a good practice to have a separate DNS entry for each WAN and a shared entry for failover, or one per failover
group. If that is not viable, at least have one for the most common needs.
The particulars of configuring Dynamic DNS entries vary by provider and are beyond the scope of this document.
IPsec can use a gateway group as an as interface, but needs a dynamic DNS hostname as companion. The remote peer
would need to use the Dynamic DNS hostname as the peer address of this firewall instead of an IP address. Because
this relies on DNS, failover can be slow.
WireGuard does not bind to an interface, but can work with Multi-WAN. It will respond from WAN2 if client contacts
WAN2, but when initiating it will always use the current default gateway. Static routes can nudge traffic for a specific
peer out a specific WAN.
OpenVPN can use a gateway group as an interface for clients or servers. Client behavior is OK and should match
default failover behavior configured on the group. For servers it is better to bind the server to localhost and use port
forwards from each WAN to localhost. Remote clients can then have multiple remote entries and contact each WAN
as needed at any time.
11.11 Testing
Methods for testing depend on the type of WANs and gateway groups in use.
• For most WANs, a better test is to unplug the upstream connection from the ISP Customer Premise Equipment
(CPE). This more accurately simulates a typical type of upstream connectivity failure. Do not power off the
CPE or unplug the connection between the firewall and the CPE. While this may work, it’s a much less common
scenario and can behave differently.
• For testing load balancing, use cURL or multiple browsers/sessions when checking the IP address multiple
times. Refreshing the same browser window will reuse a connection to the server and is not helpful for test-
ing connection-based load balancing.
TWELVE
Note: By default the Netgate 2100 is not configured with OPT interfaces. To reconfigure one or more of the LAN
switch ports as an OPT interface, see Switch Overview.
This guide configures an OPT port as an additional LAN type interface. These local interfaces can perform a variety
of tasks, such as being a guest network, DMZ, IOT isolation, wireless segment, lab network, and more.
• Requirements
• Assign the Interface
• Interface Configuration
• DHCP Server
• Outbound NAT
– Automatic or Hybrid Outbound NAT
– Manual Outbound NAT
• Firewall Rules
– Open
– Isolated
• Other Services
12.1 Requirements
• This guide assumes the underlying interface is already present (e.g. physical port, VLAN, etc).
• Choose a new local subnet to use for the additional LAN type interface. This example uses 192.168.2.0/24.
62
Security Gateway Manual Netgate-2100
• Click Add
The firewall will assign the next available OPT interface number corresponding to the internal interface designation.
For example, if there are no current OPT interfaces, the new interface will be OPT1. The next will be OPT2, and so
on.
Note: As this guide does not know what that number will be on a given configuration, it will refer to the interface
generically as OPTx.
The newly assigned interface will have its own entry under the Interfaces menu and elsewhere in the GUI.
See also:
Interface Configuration
Next, configure DHCP service for this local interface. This is a convenient and easy way assign addresses for clients
on the interface, but is optional if clients will be statically addressed instead.
This configuration varies slightly depending on the DHCP server and version.
See also:
DHCPv4 Configuration
• Navigate to Services > DHCP Server, OPTx tab (or the custom name)
• Check Enable
• Configure the Address Pool Range, e.g. from 192.168.2.100 to 192.168.2.199
This sets the lower (From) and upper (To) bound of automatic addresses assigned to clients.
• The rest of the settings can be left at defaults
• Click Save
For clients on this interface to reach the Internet from private addresses, the firewall must apply Outbound NAT for the
new subnet.
• Navigate to Firewall > NAT, Outbound tab
• Check the current outbound NAT mode and follow the section below which matches the mode.
If the mode is set to Automatic or Hybrid, then this likely does not need further configuration.
Ensure the new LAN subnet is listed as a Source in the Automatic Rules at the bottom of the page. If so, skip ahead
to the next section to configure Firewall Rules.
If the mode is set to Manual, create a new rule or set of rules to cover the new subnet.
Address Family
IPv4
Protocol
Any
Source
Either choose OPTx Subnets, which will automatically reference the new interface, or choose
Network or Alias and manually fill in the new subnet, e.g. 192.168.2.0/24.
Destination
Any
Translation Address
WAN Address (or the customized name matching the WAN/egress interface)
Description
Text describing the rule, e.g. Guest LAN outbound on WAN
• Click Save
• Click Apply Changes
Alternately, clone existing NAT rules and adjust as needed to match the new LAN.
By default there are no firewall rules on the new interface, so the firewall will block all traffic. This is not ideal for a
LAN as generally speaking, the clients on this LAN will need to contact hosts through the firewall.
Rules for this interface can be found under Firewall > Rules, on the OPTx tab (or the custom name, e.g. GUESTS).
There are two common scenarios administrators typically choose for local interfaces: Open and Isolated
12.6.1 Open
On an open LAN, hosts in that LAN are free to contact any other host through the firewall. This might be a host on the
Internet, across a VPN, or on another local LAN.
In this case a simple “allow all” style rule for the interface will suffice.
• Navigate to Firewall > Rules, on the OPTx tab (or the custom name)
Destination
Any
Description
Text describing the rule, e.g. Default allow all from OPTx
• Click Save
• Click Apply Changes
12.6.2 Isolated
In an isolated local network, hosts on the network cannot contact hosts on other networks unless explicitly allowed in
the rules. Hosts can still contact the Internet as needed in this example, but that can also be restricted with additional
rules.
This scenario is common for locked down networks such as for IOT devices, a DMZ with public services, untrusted
Guest/BYOD networks, and other similar scenarios.
Warning: A full set of reject rules as described in this example is the best practice. Do not rely on shortcuts such
as using policy routing to isolate clients.
Create an alias using all RFC 1918 networks (listed in the example below) or at least an alias containing the local/private
networks on this firewall, such as VPNs. Using all RFC 1918 networks is a safer practice.
• Navigate to Firewall > Aliases
• Click Add
• Configure the alias as follows:
Name
PrivateNets
Description
Private Networks
Type
Network(s)
• Add entries for:
– 192.168.0.0/16
– 172.16.0.0/12
– 10.0.0.0/8
• Click Save
With the alias in place, the next task is to create firewall rules for the interface.
• Navigate to Firewall > Rules, on the OPTx tab (or the custom name)
Allow DNS
Add rule to allow DNS requests from local clients to the firewall itself or other DNS servers.
Add a rule to allow ICMP traffic from local devices to the firewall.
ICMP Subtype
Any
Tip: While ICMP is useful, some network administrators prefer to limit the allowed ICMP types
to Echo Request only. This allows devices to use ICMP ping for diagnostic purposes, but no other
types of ICMP traffic.
Source
OPTx subnets (or the custom name)
Destination
This Firewall (self)
Description
Allow client ICMP to the firewall
• Click Save
Add rule to reject any other traffic to the firewall to ensure users on this interface cannot connect to management services
such as the GUI, SSH, and so on.
Add rule to reject traffic from this network to all other private networks.
Add rule to allow traffic from this interface network to any other destination, which enables clients on this interface to
reach the Internet and/or other remote public networks.
Apply Changes
With the rules all in place, click Apply Changes to finish and activate the new rules.
The rules should look similar to the following figure:
Similar to the isolated network scenario, it is also possible to be much more strict with rules to only allow specific
outbound ports. When creating this type of configuration,
In most cases the above configuration is sufficient and clients on the new LAN can now obtain an address and reach the
Internet. However, there may be other custom settings which need accounted for when adding a new local interface:
• If the DNS resolver has specific interface bindings, add the new interface to the list.
• If using ALTQ traffic shaping, re-run the shaper wizard to include this new LAN type interface.
• Consider using captive portal to control access the interface
THIRTEEN
This procedure performs a factory reset using the hardware button on the Netgate 2100.
See also:
• See Input and Output Ports to locate the reset button for the device.
• Factory Reset Video
• Factory Reset from GUI or Console
1. Remove power from the device.
2. Gently use a paper clip or similar tool to depress the reset button.
3. While keeping the button depressed, apply power to the device.
4. Keep the button depressed for about 30 seconds until the device boots far enough to check the button state.
All three LEDs will rapidly flash red once the reset process starts.
5. Wait for the device to reboot after the reset procedure completes.
When the device boots again, it will be at its factory default settings and accessible from the LAN at https://192.
168.1.1.
If this procedure fails, connect to the console and perform a factory reset there.
71
CHAPTER
FOURTEEN
SWITCH OVERVIEW
This document is an overview of how the switch operates and its capabilities.
See also:
For instructions on how to configure the switch ports, see Configuring the Switch Ports.
Warning: The switch ports do not support the Spanning Tree Protocol (STP). Two or more ports connected to
another Layer 2 switch, or connected to 2 or more different interconnected switches, could create a flooding loop
between the switches. This can cause the router to stop functioning until the loop is resolved.
The four LAN ports on the Netgate 2100 are connected internally to a switch.
In addition to the four physical ports there is also an internal switch port (Port 5) which acts as an uplink, and the
mvneta1 interface which is the corresponding operating system interface for the switch uplink.
The internal uplink port operates at 2.5 Gbps and connects the switch to the SoC. From the perspective of the operating
system, the only port is the mvneta1 interface which also runs at the same 2.5 Gbps speed.
By default, the switch is in Port VLAN Mode. The four LAN ports are configured on the same network which feeds
into the LAN interface. These four switch ports are customizable and each can be configured to act as an independent
switches or in groups.
In Port VLAN Mode, any and all VLAN tags are allowed on all ports. No VLAN tags are added or removed. Think
of it as a dummy switch that retains VLAN tags on frames, if present. This mode is useful when there are numerous
VLANs on a network and the goal is to physically segment the switch, while allowing the same VLANs on all segments
of the switch.
In Port VLAN Mode, rather than specifying which interfaces are associated to a VLAN, the configuration can specify
which physical ports form a switch.
72
Security Gateway Manual Netgate-2100
It is also possible to enable 802.1q VLAN mode instead of the default port mode.
Using VLANs, these four switch ports are customizable and each can be configured to act as independent interfaces.
For example, all of these configurations are possible:
• LAN1-4 dedicated as a LAN switch
• LAN1-2 configured as a switch for LAN A and LAN3-4 configured as a switch for LAN B
• LAN1-4 configured as individual network interfaces
• LAN1-2 configured as a switch for LAN A, LAN3 configured for WAN B, and LAN4 configured for WAN C.
Each of the switch ports (LAN1-4 and Port 5) are VLAN aware interfaces. They are capable of functioning as a standard
access or trunk port:
Access Port:
Adds a VLAN tag to inbound untagged traffic
Trunk Port:
Allows tagged traffic containing specified VLAN IDs
When switching from Port VLAN mode to 802.1q VLAN mode there is no default configuration. See Configuring the
Switch Ports for details on configuring this mode.
FIFTEEN
ADDITIONAL RESOURCES
Netgate training offers training courses for increasing your knowledge of pfSense® Plus products and services. Whether
you need to maintain or improve the security skills of your staff or offer highly specialized support and improve your
customer satisfaction; Netgate training has got you covered.
https://www.netgate.com/training
To learn more about how to use Netgate appliances and for other helpful resources, make sure to browse the Netgate
Resource Library.
https://www.netgate.com/resources
Support does not cover more complex tasks such as CARP configuration for redundancy on multiple firewalls or circuits,
network design, and conversion from other firewalls to pfSense® Plus software. These items are offered as professional
services and can be purchased and scheduled accordingly.
https://www.netgate.com/our-services/professional-services.html
Customers who elected not to get a paid support plan, can find help from the active and knowledgeable pfSense software
community on the Netgate forum.
https://forum.netgate.com/
74
CHAPTER
SIXTEEN
75