Other Types

Besides wired, wireless and VPN interfaces, there are also some other, virtual interfaces, as well as some miscellaneous interface-related. These options can be found under Interfaces ‣ Other types. This document briefly explains these options.

Bridge

Bridging allows to create a connection between separate networks, allow traffic on network A destined for network B (where both networks are connected to your OPNsense device) to reach it via this bridge. Note that this does not include DHCP services—this needs to set using DHCP relaying.

A bridge works like a (layer-2) switch, forwarding traffic from one interface to another. Multicast and broadcast packets are always forwarded to all interfaces that are part of the bridge. For unicast traffic, the bridge learns which MAC addresses are associated with which interfaces and will forward the traffic selectively.

Optionally a bridge can be configured to support (Rapid) Spanning Tree Protocol (RSTP/RTP) to prevent loops in the network topology. These options are provided in the “advanced” section of the configuration and include the following settings:

Option

Description

Enable

Enable the (Rapid) Spanning Tree Protocol

Protocol

Protocol to use, rapid or regular spanning tree

STP interfaces

The interfaces tith [R]STP enabled, from the ones in the bridge

Valid time (maxage)

Set the time that a Spanning Tree Protocol configuration is valid. The default is 20 seconds.

Forward time (fwddelay)

Set the time that must pass before an interface begins forwarding packets when Spanning Tree is enabled. The default is 15 seconds.

Hello time (hellotime)

Set the time between broadcasting of Spanning Tree Protocol configuration messages. The hello time may only be changed when operating in legacy STP mode. The default is 2 seconds.

Priority

Set the bridge priority for Spanning Tree. The default is 32768. The minimum is 0 and the maximum is 61440.

Hold count (holdcnt)

Set the transmit hold count for Spanning Tree. This is the number of packets transmitted before being rate limited. The default is 6. The minimum is 1 and the maximum is 10.

[interface] Priority (ifpriority)

Set the Spanning Tree priority of interface to value. The default is 128. The minimum is 0 and the maximum is 240. Increments of 16.

[interface] Path cost (ifpathcost)

Set the Spanning Tree path cost of interface to value. The default is calculated from the link speed. To change a previously selected path cost back to automatic, set the cost to 0. The minimum is 1 and the maximum is 200000000.

Other advanced options available in the bottom section of the screen and include the following settings:

Option

Description

Cache size (maxaddr)

Set the size of the bridge address cache to size. The default is 2000 entries.

Cache entry expire time (timeout)

Set the timeout of address cache entries to this number of seconds. If seconds is zero, then address cache entries will not be expired. The default is 1200 seconds.

Span port

Span ports transmit a copy of every frame received by the bridge. This is most useful for snooping a bridged network passively on another host connected to one of the span ports of the bridge.

Edge ports

Set interface as an edge port. An edge port connects directly to end stations and cannot create bridging loops in the network; this allows it to transition straight to forwarding.

Auto Edge ports

Allow interface to automatically detect edge status. This is the default for all interfaces added to a bridge, selecting interfaces will disable auto mode.

PTP ports

Set the interface as a point-to-point link. This is required for straight transitions to forwarding and should be enabled on a direct link to another RSTP-capable switch.

Auto PTP ports

Automatically detect the point-to-point status on interface by checking the full duplex link status. This is the default for interfaces added to the bridge, selecting interfaces will disable auto mode.

Sticky ports

Mark an interface as a “sticky” interface. Dynamically learned address entries are treated as static once entered into the cache. Sticky entries are never aged out of the cache or replaced, even if the address is seen on a different interface.

Private ports

Mark an interface as a “private” interface. A private interface does not forward any traffic to any other port that is also a private interface.

GIF

GIF (gif(4), Generic Tunnel Interface) can be used to tunnel IPv6 via IPv4 connections. A common use for this is the IPv6 tunnel of Hurricane Electric (he.net).

Note

In IPv6 Tunnel Broker you can find information on how to setup a tunnel using Hurricane Electric

As with all tunnel types, the most important settings relate to how both ends connect and which addressing will be used to route traffic over the tunnel. The rest of the settings usually are best left to their defaults.

Option

Description

Parent interface

Actually the source address the tunnel will use to connect from.

GIF remote address

Peer address where encapsulated gif packets will be sent.

GIF tunnel local address

The tunnel’s local address which will be configured on the interface.

GIF tunnel remote address

The tunnel’s remote address which will be configured on the interface.

Disable Ingress filtering

Ingress filtering on outer tunnel source can break tunnel operation in an asymmetrically routed networks, in which case this can be disabled by marking this option.

ECN friendly behavior

Note that the ECN friendly behavior violates RFC2893. This should be used in mutual agreement with the peer.

Description

User friendly description for this tunnel

GRE

GRE (gre(4), Generic Routing Encapsulation) is used to create a virtual point-to-point connection, through which encapsulated packages can be sent. This can be used to utilize (OSI-layer 3) protocols between devices over a connection that does not normally support these protocols.

Since the GRE protocol was designed by Cisco, it is often used as default tunnel technology when using their solutions.

A common use-case of GRE is also to forward (no routable) multicast traffic, although this will need additional software such as IGMP-proxy or PIMD, which are less commonly used on OPNsense.

The available settings are similar to those described for the GIF tunnel type:

Option

Description

Parent interface

Actually the source address the tunnel will use to connect from.

GRE remote address

Peer address where encapsulated gif packets will be sent.

GRE tunnel local address

The tunnel’s local address which will be configured on the interface.

GRE tunnel remote address

The tunnel’s remote address which will be configured on the interface.

Description

User friendly description for this tunnel

LAGG

LAGG (lagg(4)) allows for link aggregation, bonding and fault tolerance. This works best if your network switches support. Only unassigned interfaces can be added to LAGG.

The userinterface supports the following options:

Option

Description

Parent interface

Members of the link aggregation

Lag proto

Protocol to use for aggregation, available options are described in the next table. LACP is most commonly used.

Description

User friendly description for this interface

Fast timeout

Enable lacp fast-timeout on the interface.

Use flowid

Use the RSS hash from the network card if available, otherwise a hash is locally calculated. The default depends on the system tunable in net.link.lagg.default_use_flowid.

Hash Layers

Set the packet layers to hash for aggregation protocols which load balance.

Use strict

Enable lacp strict compliance on the interface. The default depends on the system tunable in net.link.lagg.lacp.default_strict_mode.

MTU

MTU size, when unset the smallest mtu of the LAGG children will be used.

Note

Hash Layers, specifies how the device will loadbalance the traffic across physical links in the LAGG bundle. This is done per the 5-tuple if the LACP device implementation allows it. Hash Layers, do not need to be the same between two connecting devices, it can be considered as a best practice but its not a rule of must be.

Available protocols

Name

Description

failover

Sends and receives traffic only through the master port. If the master port becomes unavailable, the next active port is used. The first interface added is the master port; any interfaces added after that are used as failover devices.

fec

Supports Cisco EtherChannel. This is a static setup and does not negotiate aggregation with the peer or exchange frames to monitor the link.

lacp

Supports the IEEE 802.3ad Link Aggregation Control Protocol (LACP) and the Marker Protocol. LACP will negotiate a set of aggregated links with the peer in to one or more Link Aggregated Groups. Each LAG is composed of ports of the same speed, set to full-duplex operation. The traffic will be balanced across the ports in the LAG with the greatest total speed, in most cases there will only be one LAG which contains all ports. In the event of changes in physical connectivity, Link Aggregation will quickly converge to a new configuration.

loadbalance

Balances outgoing traffic across the active ports based on hashed protocol header information and accepts incoming traffic from any active port. This is a static setup and does not negotiate aggregation with the peer or exchange frames to monitor the link. The hash includes the Ethernet source and destination address, and, if available, the VLAN tag, and the IP source and destination address.

roundrobin

Distributes outgoing traffic using a round-robin scheduler through all active ports and accepts incoming traffic from any active port.

none

This protocol is intended to do nothing: It disables any traffic without disabling the lagg interface itself.

Attention

The LAGG protocol should match with the one your switch supports. It is best practice to use LACP if possible. Devices connected via LAGG require the same protocol.

LACP timeout

LACP timeout has two modes; Slow/normal and Fast. It handles how fast the re-convergence occurs in case of link failure. This specifies how often the heartbeats are sent between the two LAGG connected devices.

LACP mode

Heartbeat/Timeout interval

Enable

Slow/Normal

30s

Fast timeout turned off

Fast

1s

Fast timeout turned on

The Slow/normal timeout should be the default in most cases. Due to possible vendor implementation issues, keeping the LACP timeout on Slow/normal is preferable. Fast timeout can cause connectivity disruption in some cases. LACP timeout requires the same value on both devices connected via LAGG. If not, heartbeats can be missed which will cause connectivity disruption.

Read LAGG Setup for an example configuration.

Loopback

Loopbacks are logical virtual interfaces which emulate real interfaces and can be used for different setup scenario’s, which require always-on interfaces. Below you will find some scenario’s for which these types of interfaces are used.

  • Administrative access to services on your machine, which can bind to an address configured on top of the loopback.

  • Using loopback addresses as router IDs for OSPF or BGP, which helps to identify your nodes and eases administration

VLAN

VLANs (Virtual LANs) can be used to segment a single physical network into multiple virtual networks. This can be done for QoS purposes, among other things. For this reason, most ISP-issued IPTV devices utilize VLANs.

The following settings are available for these interface types:

Name

Description

Device

Device name of this virtual interface, usually starts with vlan or qinq depending on the type

Parent interface

The interface to use as parent which it will send/receive vlan tagged traffic on

VLAN tag

802.1Q VLAN tag (between 1 and 4094)

VLAN priority

802.1Q VLAN PCP (priority code point)

Description

User friendly description for this interface

Note

802.1ad , also known as QinQ, is supported via the VLAN configuration in which case you would stack a vlan on top of a vlan, the device name should start with qinq in that case.

Read VLAN Setup for an example configuration.

VXLAN

Virtual eXtensible Local Area Networks (VXLAN) are used to overlay virtualized layer 2 networks over layer 3 networks as described by rfc7348.

Tunnels can be setup in point to point (parameter Remote address) or multicast (parameters Multicast group and Device). The Source address must be an existing (statically assigned) address assigned at this firewall, which will be used as source in the encapsulating IPv4/IPv6 header.

Note

Since the vxlan interface encapsulates the Ethernet frame with an IP, UDP, and vxlan header, the resulting frame may be larger than the MTU of the physical network. The vxlan specification recommends the physical network MTU be configured to use jumbo frames to accommodate the encapsulated frame size. Alternatively, the MTU size on the vxlan interface might be reduced to allow the encapsulated frame to fit in the current MTU of the physical network.

Read VXLAN Bridge for an example configuration with a common setup.