1
0
mirror of https://github.com/MonkWho/pfatt.git synced 2024-11-11 21:00:08 +01:00
pfatt/README.md

343 lines
20 KiB
Markdown
Raw Normal View History

2018-09-22 23:24:43 +02:00
# About
This repository includes my notes on enabling a true bridge mode setup with AT&T U-Verse and pfSense. This method utilizes [netgraph](https://www.freebsd.org/cgi/man.cgi?netgraph(4)) which is a graph based kernel networking subsystem of FreeBSD. This low-level solution was required to account for the unique issues surrounding bridging 802.1X traffic and tagging a VLAN with an id of 0. I've tested and confirmed this setup works with AT&T U-Verse Internet on the ARRIS NVG589, NVG599 and BGW210-700 residential gateways (probably others too). For Pace 5268AC see special details below.
2018-09-22 23:24:43 +02:00
2018-09-26 05:19:26 +02:00
There are a few other methods to accomplish true bridge mode, so be sure to see what easiest for you. True Bridge Mode is also possible in a Linux via ebtables or using hardware with a VLAN swap trick. For me, I was not using a Linux-based router and the VLAN swap did not seem to work for me.
2018-09-22 23:24:43 +02:00
2018-12-03 03:44:38 +01:00
While many AT&T residential gateways offer something called _IP Passthrough_, it does not provide the same advantages of a true bridge mode. For example, the NAT table is still managed by the gateway, which is limited to a measly 8192 sessions (although it becomes unstable at even 60% capacity).
2018-09-22 23:24:43 +02:00
2018-09-26 05:19:26 +02:00
The netgraph method will allow you to fully utilize your own router and fully bypass your residential gateway. It survives reboots, re-authentications, IPv6, and new DHCP leases.
# How it Works
Before continuing to the setup, it's important to understand how this method works. This will make configuration and troubleshooting much easier.
2018-12-03 03:44:38 +01:00
## Standard Procedure
2018-09-26 05:19:26 +02:00
First, let's talk about what happens in the standard setup (without any bypass). At a high level, the following process happens when the gateway boots up:
2018-12-03 03:44:38 +01:00
1. All traffic on the ONT is protected with [802.1/X](https://en.wikipedia.org/wiki/IEEE_802.1X). So in order to talk to anything, the Router Gateway must first perform the [authentication procedure](https://en.wikipedia.org/wiki/IEEE_802.1X#Typical_authentication_progression). This process uses a unique certificate that is hardcoded on your residential gateway.
2019-04-29 15:22:59 +02:00
1. Once the authentication completes, you'll be able to properly "talk" to the outside. But strangely, all of your traffic will need to be tagged with VLAN id 0 before the IP gateway will respond. I believe VLAN0 is an obscure Cisco feature of 802.1Q CoS, but I'm not really sure.
2018-09-26 05:19:26 +02:00
1. Once traffic is tagged with VLAN0, your residential gateway needs to request a public IPv4 address via DHCP. The MAC address in the DHCP request needs to match that of the MAC address that's assigned to your AT&T account. Other than that, there's nothing special about the DCHPv4 handshake.
1. After the DHCP lease is issued, the WAN setup is complete. Your LAN traffic is then NAT'd and routed to the outside.
## Bypass Procedure
2018-12-03 03:44:38 +01:00
To bypass the gateway using pfSense, we can emulate the standard procedure. If we connect our Residential Gateway and ONT to our pfSense box, we can bridge the 802.1/X authentication sequence, tag our WAN traffic as VLAN0, and request a public IPv4 via DHCP using a spoofed MAC address.
2018-09-26 05:19:26 +02:00
2018-12-03 03:44:38 +01:00
Unfortunately, there are some challenges with emulating this process. First, it's against RFC to bridge 802.1/X traffic and it is not supported. Second, tagging traffic as VLAN0 is not supported through the standard interfaces.
2018-09-26 05:19:26 +02:00
This is where netgraph comes in. Netgraph allows you to break some rules and build the proper plumbing to make this work. So, our cabling looks like this:
```
Residential Gateway
[ONT Port]
|
|
[nic0] pfSense [nic1]
|
|
[ONT]
Outside
```
With netgraph, our procedure looks like this (at a high level):
2018-12-03 03:44:38 +01:00
1. The Residential Gateway initiates a 802.1/X EAPOL-START.
2018-09-26 05:19:26 +02:00
1. The packet then is bridged through netgraph to the ONT interface.
1. If the packet matches an 802.1/X type (which is does), it is passed to the ONT interface. If it does not, the packet is discarded. This prevents our Residential Gateway from initiating DHCP. We want pfSense to handle that.
1. The ONT should then see and respond to the EAPOL-START, which is passed back through our netgraph back to the residential gateway. At this point, the 802.1/X authentication should be complete.
1. netgraph has also created an interface for us called `ngeth0`. This interface is connected to `ng_vlan` which is configured to tag all traffic as VLAN0 before sending it on to the ONT interface.
1. pfSense can then be configured to use `ngeth0` as the WAN interface.
1. Next, we spoof the MAC address of the residential gateway and request a DHCP lease on `ngeth0`. The packets get tagged as VLAN0 and exit to the ONT.
1. Now the DHCP handshake should complete and we should be on our way!
Hopefully, that now gives you an idea of what we are trying to accomplish. See the comments and commands `bin/pfatt.sh` for details about the netgraph setup.
But enough talk. Now for the fun part!
# Setup
2018-09-22 23:24:43 +02:00
## Prerequisites
2018-09-26 05:19:26 +02:00
* At least __three__ physical network interfaces on your pfSense server
2018-09-22 23:24:43 +02:00
* The MAC address of your Residential Gateway
* Local or console access to pfSense
2018-09-30 02:40:50 +02:00
* pfSense 2.4.4 _(confirmed working in 2.4.3 too, other versions should work but YMMV)_
2018-09-22 23:24:43 +02:00
2018-09-30 01:12:57 +02:00
If you only have two NICs, you can buy this cheap USB 100Mbps NIC [from Amazon](https://amzn.to/2P0yn8k) as your third. It has the Asix AX88772 chipset, which is supported in FreeBSD with the [axe](https://www.freebsd.org/cgi/man.cgi?query=axe&sektion=4) driver. I've confirmed it works in my setup. The driver was already loaded and I didn't have to install or configure anything to get it working. Also, don't worry about the poor performance of USB or 100Mbps NICs. This third NIC will only send/recieve a few packets periodicaly to authenticate your Router Gateway. The rest of your traffic will utilize your other (and much faster) NICs.
2018-09-22 23:24:43 +02:00
## Install
2018-12-03 03:37:42 +01:00
1. Copy the `bin/ng_etf.ko` amd64 kernel module to `/boot/kernel` on your pfSense box (because it isn't included):
2018-09-22 23:24:43 +02:00
a) Use the pre-compiled kernel module from me, a random internet stranger:
```
scp bin/ng_etf.ko root@pfsense:/boot/kernel/
2018-09-25 06:14:31 +02:00
ssh root@pfsense chmod 555 /boot/kernel/ng_etf.ko
2018-09-22 23:24:43 +02:00
```
2018-12-09 00:30:15 +01:00
**NOTE:** The `ng_etf.ko` in this repo was compiled for amd64 from the FreeBSD 11.2 release source code. It may also work on other/future versions of pfSense depending if there have been [significant changes](https://github.com/freebsd/freebsd/commits/master/sys/netgraph/ng_etf.c).
2018-09-22 23:24:43 +02:00
2018-09-30 02:40:50 +02:00
b) Or you, a responsible sysadmin, can compile the module yourself from another, trusted FreeBSD machine. _You cannot build packages directly on pfSense._ Your FreeBSD version should match that of your pfSense version. (Example: pfSense 2.4.4 = FreeBSD 11.2)
2018-09-22 23:24:43 +02:00
```
2018-09-25 22:58:00 +02:00
# from a FreeBSD machine (not pfSense!)
2018-09-30 02:40:50 +02:00
fetch ftp://ftp.freebsd.org/pub/FreeBSD/releases/amd64/amd64/11.2-RELEASE/src.txz
2018-09-22 23:24:43 +02:00
tar -C / -zxvf src.txz
cd /usr/src/sys/modules/netgraph
make
scp etf/ng_etf.ko root@pfsense:/boot/kernel/
ssh root@pfsense chmod 555 /boot/kernel/ng_etf.ko
```
2018-12-03 03:37:42 +01:00
**NOTE:** You'll need to tweak your compiler parameters if you need to build for another architecture, like ARM.
2018-09-26 05:19:26 +02:00
2. Edit the following configuration variables in `bin/pfatt.sh` as noted below. `$RG_ETHER_ADDR` should match the MAC address of your Residential Gateway. AT&T will only grant a DHCP lease to the MAC they assigned your device. In my environment, it's:
2018-09-23 00:15:00 +02:00
```shell
2018-09-25 22:50:19 +02:00
ONT_IF='bce0' # NIC -> ONT / Outside
RG_IF='ue0' # NIC -> Residential Gateway's ONT port
2018-09-23 00:15:00 +02:00
RG_ETHER_ADDR='xx:xx:xx:xx:xx:xx' # MAC address of Residential Gateway
2018-09-22 23:24:43 +02:00
```
2018-09-29 01:23:16 +02:00
3. Copy `bin/pfatt.sh` to `/root/bin` (or any directory):
2018-09-22 23:24:43 +02:00
```
2018-11-01 23:45:59 +01:00
ssh root@pfsense mkdir /root/bin
scp bin/pfatt.sh root@pfsense:/root/bin/
2018-09-29 01:23:16 +02:00
ssh root@pfsense chmod +x /root/bin/pfatt.sh
2018-09-22 23:24:43 +02:00
```
Now edit your `/conf/config.xml` to include `<earlyshellcmd>/root/bin/pfatt.sh</earlyshellcmd>` above `</system>`.
**NOTE:** If you have the 5268AC, you'll also need to install `pfatt-5268.sh`. The script monitors your connection and disables or enables the EAP bridging as needed. It's a hacky workaround, but it enables you to keep your 5268AC connected, avoid EAP-Logoffs and survive reboots. Consider changing the `PING_HOST` in `pfatt-5268AC.sh` to a reliable host. Then perform these additional steps to install:
2018-12-10 05:29:28 +01:00
Copy `bin/pfatt-5268AC` to `/usr/local/etc/rc.d/`
Copy `bin/pfatt-5268AC.sh` to `/root/bin/`:
```
2019-02-26 05:55:33 +01:00
scp bin/pfatt-5268AC root@pfsense:/usr/local/etc/rc.d/pfatt-5268AC.sh
2018-12-10 05:29:28 +01:00
scp bin/pfatt-5268AC.sh root@pfsense:/root/bin/
2019-02-26 05:55:33 +01:00
ssh root@pfsense chmod +x /usr/local/etc/rc.d/pfatt-5268AC.sh /root/bin/pfatt-5268AC.sh
```
2018-09-22 23:24:43 +02:00
2018-09-26 05:19:26 +02:00
4. Connect cables:
2018-12-03 03:44:38 +01:00
- `$RG_IF` to Residential Gateway on the ONT port (not the LAN ports!)
2018-09-25 22:42:55 +02:00
- `$ONT_IF` to ONT (outside)
2018-09-22 23:24:43 +02:00
- `LAN NIC` to local switch (as normal)
2018-09-26 05:19:26 +02:00
5. Prepare for console access.
6. Reboot.
7. pfSense will detect new interfaces on bootup. Follow the prompts on the console to configure `ngeth0` as your pfSense WAN. Your LAN interface should not normally change. However, if you moved or re-purposed your LAN interface for this setup, you'll need to re-apply any existing configuration (like your VLANs) to your new LAN interface. pfSense does not need to manage `$RG_IF` or `$ONT_IF`. I would advise not enabling those interfaces in pfSense as it can cause problems with the netgraph.
2018-09-26 05:19:26 +02:00
8. In the webConfigurator, configure the WAN interface (`ngeth0`) to DHCP using the MAC address of your Residential Gateway.
2018-09-22 23:24:43 +02:00
2018-09-25 06:00:41 +02:00
If everything is setup correctly, netgraph should be bridging EAP traffic between the ONT and RG, tagging the WAN traffic with VLAN0, and your WAN interface configured with an IPv4 address via DHCP.
2018-09-22 23:24:43 +02:00
2018-09-25 06:00:41 +02:00
# IPv6 Setup
Once your netgraph setup is in place and working, there aren't any netgraph changes required to the setup to get IPv6 working. These instructions can also be followed with a different bypass method other than the netgraph method. Big thanks to @pyrodex1980's [post](http://www.dslreports.com/forum/r32118263-) on DSLReports for sharing your notes.
2018-09-30 02:40:50 +02:00
This setup assumes you have a fairly recent version of pfSense. I'm using 2.4.4.
2018-09-25 06:00:41 +02:00
**DUID Setup**
1. Go to _System > Advanced > Networking_
1. Configure **DHCP6 DUID** to _DUID-EN_
1. Configure **DUID-EN** to _3561_
2018-12-25 18:06:23 +01:00
1. Configure your **IANA Private Enterprise Number**. This number is unique for each customer and (I believe) based off your Residential Gateway serial number. You can generate your DUID using [gen-duid.sh](https://github.com/aus/pfatt/blob/master/bin/gen-duid.sh), which just takes a few inputs. Or, you can take a pcap of the Residential Gateway with some DHCPv6 traffic. Then fire up Wireshark and look for the value in _DHCPv6 > Client Identifier > Identifier_. Add the value as colon separated hex values `00:00:00`.
2018-09-25 06:00:41 +02:00
1. Save
**WAN Setup**
1. Go to _Interfaces > WAN_
1. Enable **IPv6 Configuration Type** as _DHCP6_
1. Scroll to _DCHP6 Client Configuration_
2018-12-12 17:26:53 +01:00
1. Enable **DHCPv6 Prefix Delegation size** as _60_
1. Enable _Send IPv6 prefix hint_
2018-09-25 06:00:41 +02:00
1. Enable _Do not wait for a RA_
1. Save
**LAN Setup**
1. Go to _Interfaces > LAN_
1. Change the **IPv6 Configuration Type** to _Track Interface_
1. Under Track IPv6 Interface, assign **IPv6 Interface** to your WAN interface.
2018-12-12 17:26:53 +01:00
1. Configure **IPv6 Prefix ID** to _1_. We start at _1_ and not _0_ because pfSense will use prefix/address ID _0_ for itself and it seems AT&T is flakey about assigning IPv6 prefixes when a request is made with a prefix ID that matches the prefix/address ID of the router.
2018-09-25 06:00:41 +02:00
1. Save
2018-12-12 17:26:53 +01:00
If you have additional LAN interfaces repeat these steps for each interface except be sure to provide an **IPv6 Prefix ID** that is not _0_ and is unique among the interfaces you've configured so far.
2018-09-25 06:00:41 +02:00
**DHCPv6 Server & RA**
1. Go to _Services > DHCPv6 Server & RA_
1. Enable DHCPv6 server on interface LAN
2018-12-12 17:26:53 +01:00
1. Configure a range of ::0001 to ::ffff:ffff:ffff:fffe
2018-09-25 06:00:41 +02:00
1. Configure a **Prefix Delegation Range** to _64_
1. Save
1. Go to the _Router Advertisements_ tab
1. Configure **Router mode** as _Stateless DHCP_
1. Save
2018-12-03 03:44:38 +01:00
That's it! Now your clients should be receiving public IPv6 addresses via DHCP6.
2018-09-25 06:00:41 +02:00
2018-09-26 05:19:26 +02:00
# Troubleshooting
2018-09-22 23:24:43 +02:00
2018-11-21 01:30:47 +01:00
## Logging
Output from `pfatt.sh` and `pfatt-5268AC.sh` can be found in `/var/log/pfatt.log`.
2018-09-22 23:24:43 +02:00
## tcpdump
2018-09-26 05:19:26 +02:00
Use tcpdump to watch the authentication, vlan and dhcp bypass process (see above). Run tcpdumps on the `$ONT_IF` interface and the `$RG_IF` interface:
2018-09-22 23:24:43 +02:00
```
tcpdump -ei $ONT_IF
tcpdump -ei $RG_IF
```
2018-09-26 05:19:26 +02:00
Restart your Residential Gateway. From the `$RG_IF` interface, you should see some EAPOL starts like this:
2018-09-22 23:24:43 +02:00
```
MAC (oui Unknown) > MAC (oui Unknown), ethertype EAPOL (0x888e), length 60: POL start
```
2018-09-26 05:19:26 +02:00
If you don't see these, make sure you're connected to the ONT port.
2018-09-22 23:24:43 +02:00
2018-09-26 05:19:26 +02:00
These packets come every so often. I think the RG does some backoff / delay if doesn't immediately auth correctly. You can always reboot your RG to initiate the authentication again.
2018-09-22 23:24:43 +02:00
2018-09-26 05:19:26 +02:00
If your netgraph is setup correctly, the EAP start packet from the `$RG_IF` will be bridged onto your `$ONT_IF` interface. Then you should see some more EAP packets from the `$ONT_IF` interface and `$RG_IF` interface as they negotiate 802.1/X EAP authentication.
2018-09-22 23:24:43 +02:00
2018-09-26 05:19:26 +02:00
Once that completes, watch `$ONT_IF` and `ngeth0` for DHCP traffic.
2018-09-22 23:24:43 +02:00
```
2018-09-26 05:19:26 +02:00
tcpdump -ei $ONT_IF port 67 or port 68
tcpdump -ei ngeth0 port 67 or port 68
2018-09-22 23:24:43 +02:00
```
2018-09-26 05:19:26 +02:00
Verify you are seeing 802.1Q (tagged as vlan0) traffic on your `$ONT_IF ` interface and untagged traffic on `ngeth0`.
Verify the DHCP request is firing using the MAC address of your Residential Gateway.
2018-09-22 23:24:43 +02:00
2018-09-24 06:21:40 +02:00
If the VLAN0 traffic is being properly handled, next pfSense will need to request an IP. `ngeth0` needs to DHCP using the authorized MAC address. You should see an untagged DCHP request on `ngeth0` carry over to the `$ONT_IF` interface tagged as VLAN0. Then you should get a DHCP response and you're in business.
2018-09-26 05:19:26 +02:00
If you don't see traffic being bridged between `ngeth0` and `$ONT_IF`, then netgraph is not setup correctly.
2018-09-24 06:21:40 +02:00
## Promiscuous Mode
2018-12-03 03:44:38 +01:00
`pfatt.sh` will put `$RG_IF` in promiscuous mode via `/sbin/ifconfig $RG_IF promisc`. Otherwise, the EAP packets would not bridge. I think this is necessary for everyone but I'm not sure. Turn it off if it's causing issues.
2018-09-22 23:24:43 +02:00
2018-09-23 00:18:26 +02:00
## netgraph
2018-09-22 23:24:43 +02:00
2018-12-03 03:44:38 +01:00
The netgraph system provides a uniform and modular system for the implementation of kernel objects which perform various networking functions. If you're unfamiliar with netgraph, this [tutorial](http://www.netbsd.org/gallery/presentations/ast/2012_AsiaBSDCon/Tutorial_NETGRAPH.pdf) is a great introduction.
2018-09-22 23:24:43 +02:00
Your netgraph should look something like this:
2018-09-22 23:29:47 +02:00
![netgraph](img/ngctl.png)
2018-09-22 23:24:43 +02:00
2018-09-24 06:21:40 +02:00
In this setup, the `ue0` interface is my `$RG_IF` and the `bce0` interface is my `$ONT_IF`. You can generate your own graphviz via `ngctl dot`. Copy the output and paste it at [webgraphviz.com](http://www.webgraphviz.com/).
2018-09-22 23:24:43 +02:00
Try these commands to inspect whether netgraph is configured properly.
1. Confirm kernel modules are loaded with `kldstat -v`. The following modules are required:
- netgraph
- ng_ether
- ng_eiface
- ng_one2many
- ng_vlan
- ng_etf
2018-09-24 06:21:40 +02:00
2. Issue `ngctl list` to list netgraph nodes. Inspect `pfatt.sh` to verify the netgraph output matches the configuration in the script. It should look similar to this:
```
$ ngctl list
There are 9 total nodes:
Name: o2m Type: one2many ID: 000000a0 Num hooks: 3
Name: vlan0 Type: vlan ID: 000000a3 Num hooks: 2
Name: ngeth0 Type: eiface ID: 000000a6 Num hooks: 1
Name: <unnamed> Type: socket ID: 00000006 Num hooks: 0
Name: ngctl28740 Type: socket ID: 000000ca Num hooks: 0
Name: waneapfilter Type: etf ID: 000000aa Num hooks: 2
Name: laneapfilter Type: etf ID: 000000ae Num hooks: 3
Name: bce0 Type: ether ID: 0000006e Num hooks: 1
Name: ue0 Type: ether ID: 00000016 Num hooks: 2
```
2018-09-26 05:19:26 +02:00
3. Inspect the various nodes and hooks. Example for `ue0`:
2018-09-24 06:21:40 +02:00
```
$ ngctl show ue0:
Name: ue0 Type: ether ID: 00000016 Num hooks: 2
Local hook Peer name Peer type Peer ID Peer hook
---------- --------- --------- ------- ---------
upper laneapfilter etf 000000ae nomatch
lower laneapfilter etf 000000ae downstream
```
### Reset netgraph
`pfatt.sh` expects a clean netgraph before it can be ran. To reset a broken netgraph state, try this:
```shell
/usr/sbin/ngctl shutdown waneapfilter:
/usr/sbin/ngctl shutdown laneapfilter:
2018-09-24 16:36:50 +02:00
/usr/sbin/ngctl shutdown $ONT_IF:
/usr/sbin/ngctl shutdown $RG_IF:
2018-09-24 06:21:40 +02:00
/usr/sbin/ngctl shutdown o2m:
/usr/sbin/ngctl shutdown vlan0:
/usr/sbin/ngctl shutdown ngeth0:
```
## pfSense
In some circumstances, pfSense may alter your netgraph. This is especially true if pfSense manages either your `$RG_IF` or `$ONT_IF`. If you make some interface changes and your connection breaks, check to see if your netgraph was changed.
2018-09-22 23:24:43 +02:00
# Virtualization Notes
This setup has been tested on physical servers and virtual machines. Virtualization adds another layer of complexity for this setup, and will take extra consideration.
## QEMU / KVM / Proxmox
2018-09-26 05:19:26 +02:00
Proxmox uses a bridged networking model, and thus utilizes Linux's native bridge capability. To use this netgraph method, you do a PCI passthrough for the `$RG_IF` and `$ONT_IF` NICs. The bypass procedure should then be the same.
2018-09-22 23:24:43 +02:00
2018-09-26 05:19:26 +02:00
You can also solve the EAP/802.1X and VLAN0/802.1Q problem by setting the `group_fwd_mask` and creating a vlan0 interface to bridge to your VM. See *Other Methods* below.
2018-09-22 23:24:43 +02:00
## ESXi
2018-09-26 05:19:26 +02:00
I haven't tried to do this with ESXi. Feel free to submit a PR with notes on your experience. PCI passthrough is probably the best approach here though.
2018-09-22 23:24:43 +02:00
# Other Methods
## Linux
If you're looking how to do this on a Linux-based router, please refer to [this method](http://blog.0xpebbles.org/Bypassing-At-t-U-verse-hardware-NAT-table-limits) which utilizes ebtables and some kernel features. The method is well-documented there and I won't try to duplicate it. This method is generally more straight forward than doing this on BSD. However, please submit a PR for any additional notes for running on Linux routers.
## VLAN Swap
There is a whole thread on this at [DSLreports](http://www.dslreports.com/forum/r29903721-AT-T-Residential-Gateway-Bypass-True-bridge-mode). The gist of this method is that you connect your ONT, RG and WAN to a switch. Create two VLANs. Assign the ONT and RG to VLAN1 and the WAN to VLAN2. Let the RG authenticate, then change the ONT VLAN to VLAN2. The WAN the DHCPs and your in business.
2018-12-03 03:44:38 +01:00
However, I don't think this works for everyone. I had to explicitly tag my WAN traffic to VLAN0 which wasn't supported on my switch.
2018-09-22 23:24:43 +02:00
2018-09-23 00:18:26 +02:00
## OPNSense / FreeBSD
For OPNSense 20.1:
2019-04-04 23:09:06 +02:00
follow the pfSense instructions, EXCEPT:
1) use file opnatt.sh
2) do *NOT* install the ng_etf.ko, as OPNSense already has this module installed.
3) put the opnatt.sh script into `/usr/local/etc/rc.syshook.d/early` as `99-opnatt.sh
4) do *NOT* modify config.xml, nor do any of the duid stuff
5) note: You *CAN* use IPv6 Prefix id 0, as OPNSense does *NOT* assign a routeable IPv6 address to ngeth0
2019-04-04 23:09:06 +02:00
I haven't tried this with native FreeBSD, but I imagine the process is ultimately the same with netgraph. Feel free to submit a PR with notes on your experience.
2018-09-23 00:18:26 +02:00
2018-09-22 23:24:43 +02:00
# U-verse TV
2019-08-04 22:18:08 +02:00
See [U-VERSE_TV.md](U-VERSE_TV.md)
2018-09-22 23:24:43 +02:00
# References
- http://blog.0xpebbles.org/Bypassing-At-t-U-verse-hardware-NAT-table-limits
2018-09-24 06:21:40 +02:00
- https://forum.netgate.com/topic/99190/att-uverse-rg-bypass-0-2-btc/
- http://www.dslreports.com/forum/r29903721-AT-T-Residential-Gateway-Bypass-True-bridge-mode
2018-09-26 05:19:26 +02:00
- https://www.dslreports.com/forum/r32127305-True-Bridge-mode-on-pfSense-with-netgraph
- https://www.dslreports.com/forum/r32116977-AT-T-Fiber-RG-Bypass-pfSense-IPv6
2018-09-22 23:24:43 +02:00
- http://www.netbsd.org/gallery/presentations/ast/2012_AsiaBSDCon/Tutorial_NETGRAPH.pdf
# Credits
This took a lot of testing and a lot of hours to figure out. A unique solution was required for this to work in pfSense. If this helped you out, please buy us a coffee.
2018-09-26 05:19:26 +02:00
- [rajl](https://forum.netgate.com/user/rajl) - for the netgraph idea - 1H8CaLNXembfzYGDNq1NykWU3gaKAjm8K5
- [pyrodex](https://www.dslreports.com/profile/1717952) - for IPv6 - ?
2018-09-22 23:24:43 +02:00
- [aus](https://github.com/aus) - 31m9ujhbsRRZs4S64njEkw8ksFSTTDcsRU
2019-08-04 22:18:08 +02:00
- [/u/MisterBazz](https://www.reddit.com/user/MisterBazz/) - [for the initial setup guide on U-verse TV documentation](https://www.reddit.com/r/PFSENSE/comments/ag43rb/att_bgw210_true_independent_bridge_mode_uverse/) that formed the basis for [U-VERSE_TV.md](U-VERSE_TV.md)
- [0xC0ncord](https://github.com/0xC0ncord) - for the [U-Verse TV Documentation](U-VERSE_TV.md)