Posts filed under ‘Networking’

Adventures in DNS

I just posted about my new PA-220 firewall and mentioned URL filtering.  I have a number of categories blocked, including web-advertising, adult content, malware, etc.  But you can always make something better, right?

The PA-220 has a feature to enforce safe search with various search engines.  Unfortunately, it seems to not work very well on my iPhone, or in Safari on my Mac.  It could be the 8.0.2 firmware, or perhaps it’s something that I’m doing wrong.  In any case, I wanted to fix it, as it was annoying.

Both Google and Bing support a feature to enable Safe Search for your network via DNS.  What you have to do is, when someone requests google.com, make your DNS return a CNAME record for forcesafesearch.google.com.  While this might sound easy, as I discovered, its a bit more complex than perhaps it should be.

First, the DNS proxy feature in my PA-220 does support configuring static entries, so I could add an entry for http://www.google.com, but I can’t set it to CNAMEs, only IP addresses.  I  would have to hard code the IP address for forcesafesearch.google.com, which could potentially change at any time, breaking things.

After a bit of research, my first candidate to truly do the CNAME change was found.

DNSmasq

On my unRaid box, I installed a docker of Pi-Hole, which is a DNS based system (meant for the Raspberry Pi, but capable of running on other platforms) which blackholes DNS queries to Web advertising sites, etc.  It uses DNSmasq and has the ability to run DHCP as well as DNS.  With this integration, it can resolve local hostnames to their DHCP assigned addressing.  I could do that now by adding static entries to my DNS Proxy instance on the PA-220, but it wouldn’t pick up on DHCP entries.  But, alas, DNSmasq treats a CNAME entry added manually differently than I had hoped.  It will ignore it unless it has that record defined somewhere, such at a static definition or via DHCP…  It won’t resolve an external CNAME like a normal query and return it.  And since if I were to define forcesafesearch.google.com as an A record in DNSmasq, that would really defeat the whole purpose of using the CNAME.

Pi-Hole does have a very nice modern web interface with statistics, graphs, and it looks extremely easy to whitelist or blacklist sites.  It gives you great visibility into what devices on your network are doing the most DNS lookups, and if you are wondering where your IoT devices go on the Internet, you can even filter the logs to see what an individual device is performing lookups against, assuming you have all your devices directly querying Pi-Hole, instead of chained like I’m doing here.  In fact, you can even disable the blocking functionality if you like.  With it disabled, it won’t block, but you’ll be able to see all the statistics and logs it has to offer, even showing you what it would have blocked.  Today, it has blocked about 8.8 percent of my DNS queries, though I haven’t really noticed much different than when I simply go through my PA-220.

Dingo

While looking for other DNS packages that could do this CNAME trick, I ran across one that looked very interesting for a different reason.  Dingo is effectively a DNS resolver that takes requests in on port 53, and resolves them over encrypted HTTP/2.  It can be used with both Google and OpenResolve (by OpenDNS).  I installed it as another docker and it seems to work fine.  I did increase it to use 25 worker threads instead of the initial 10.  I don’t know if I’ll keep using this or not, but I’ll see how it goes.

Bind

Other research turned up some settings for Bind that would let me add the CNAME records I needed to for Google and Bing to enforce safe search, and yet another Docker was installed.  The one I chose included Webmin for easy administration of Bind.  It worked just fine.

So, now I have the initial DNS queries pointing to the PA-220, taking advantage of the Threat/URL Filtering there, then forwarding to a docker running Bind to handle google and bing domains, which forwards to Pi-Hole (which I may end up removing from this chain), and finally to Dingo to perform the actual DNS lookups over encrypted HTTP/2.

Whew!

That sounds like a lot, but not including the PA-220 (which was doing this job before), I’ve added three hops that all exist on the same box.

Advertisements

May 21, 2017 at 7:48 pm Leave a comment

The PA-220 Firewall is here!

The PA-220 has 8 ports of Gigabit goodness on the front, aside from the management port.

The PA-220 supports some pretty high-end features, making it suitable for use in a small business office.  First, there is High Availability mode (HA), if you have a pair of PA-220s and duplicate your connectivity (even to your WAN, so you’d need a switch between a Cable/DSL modem and the pair of firewalls)  Another big feature is LACP support (Link Aggregation Control Protocol), so you could have multiple connections between your firewall and an Ethernet switch.  This redundancy is something that small offices would likely want, as when the WAN connection is down, there is probably work that can’t be done.

The PA-220 comes with a template and hardware to mount it sideways on a wall, something that I plan to do at some point but haven’t gotten around to yet.

Since the speed that the PA-220 handles traffic is limited to about 500 Mbps firewalled, and down to about 150 Mbps with Threat enabled, I recommend only putting relatively low speed or volume devices directly on the ports of the firewall itself, if the primary thing they are communicating to is also on the local LAN.  You could always add a rule in for intrazone traffic to be allowed and not place any Threat profiles on that rule, giving you the maximum 500 Mbps speed to the internal network.

I’ve got it in place, doing SSL decryption, Threat, URL filtering, Wildfire, and GlobalProtect VPN.  It seems to perform pretty well so far.

May 21, 2017 at 11:20 am 7 comments

Palo Alto PA-220

About a month ago, Palo Alto announced their new 8.0 firmware, along with some new hardware.  The most exciting new product to me, personally, is their new PA-220.

The PA-200 is a unit I have a lot of experience with.  It’s got 4 Gig ports for traffic, supports 100 Mbps of firewall throughput, dropping to 50 Mbps with Threat prevention enabled.  It’s a good unit for a small office.

The PA-220 is better, sporting 8 Gig ports for traffic, 500 Mbps of firewall throughput, dropping to 150 Mbps with Threat enabled.  It is without fans, and since it uses EMMC for storage (32 GB), there shouldn’t be any moving parts to break down.

Basically, it’s got more power than a PA-500, the same number of ports, and it’s in an even smaller package than the PA-200.

Best of all, it’s at a much better price point than the PA-200.

March 7, 2017 at 11:20 pm 1 comment

Eero – Features

Speed test

The IOS app has a built-in speed test that seems to use Internet connected servers under the control of Eero.  This appears to be a speed test from your gateway Eero to servers managed by Eero.  It doesn’t let you test your raw WiFi speed, which would be nice, so you can see exactly how good your coverage is from a given device at a given location.  So far, I’ve not been terribly impressed with their implementation of a speed test.  From my IOS device, connected to the Eero wifi network, I can run the Ookla speed test app, and get pretty much max speed from my Internet connection, but the results shown in the Eero IOS app are routinely much lower than my ISP actually provides.  I believe they are working to improve this.

Connected Devices

The IOS app gives you a nice list of Connected Devices, along with devices that were recently on your network.  You can see a nickname you’ve manually assigned for each device, or the hostname for some (such as Macs and IOS devices), along with a guess at who makes the device based upon the MAC address.  A downside here is that some devices use “Private” MAC addresses, which they aren’t supposed to do, making it harder to identify them.  It is nice that you can give them a Nickname once you figure out what they are, though.

Guest Network

I had the opportunity to try out the Guest Network feature this weekend.  The IOS app has a “Guest access” section.  Pop over there, hit a toggle switch to enable it, and you have a second SSID up and running, which is segmented from your normal network.  This is perfect for sharing network access with people who aren’t often at your home, and who you don’t want to have access to devices on your network – Just the Internet.  When you hit the “Share guest network” button, it brings up the familiar IOS interface so you can send it in an iMessage or an email.  In my case, I just looked at the pre-generated password and typed it in.  If you want to share your main network, there’s a button for that too.

Family Profiles

This is a feature I like, but it doesn’t do as much as I expected…  You can create a family profile for each of your kids and add their devices to their profile.  There’s a pause button next to each of them, allowing you to pause the Internet for each profile with a tap.  You can also set a schedule… The initial one defaults to the name “Bedtime”, which is 10 PM for my girls on school nights.  When a device is paused, if they attempt to browse to a website, they get a message indicating it’s paused, so they aren’t just left staring at a spinning icon, wondering why the website isn’t loading.  That probably only works for HTTP sites, but it’s a good start.

Another good use for this feature is to help identify devices.  Create a profile called “Unknown”, and place a single device that you’ve been unable to identify into that profile, then pause it.  At that point, look around and figure out what can’t access the Internet.

I really did hope for more with this feature, however.  When I read that Eero added “Family Profiles”, I think I expected content filtering.  The ability to set a content filter for each profile, so you can block your little ones (and yourself!) from bad things on the Internet.  Ideally, you’d be able to create your own customized list of categories to block with some sensible defaults, assign each Family Profile with a content filter profile, and have some way to see what is being blocked and by which profile.

I do understand that some companies don’t want to do content filtering.  No method is perfect, but having some method to guard against little Suzie ending up accidentally reaching a porn site would be a good thing.   A few years ago, if you went to show your kids the White House web page and, out of habit, went to “.com” instead of “.gov”, you might be surprised at the kind of site you reached.  Some level of content filtering would stop some accidents like that.

Why not get a dedicated content filtering device, like a Circle?

An Eero engineer on the reddit Eero forum basically warns against using a Circle with the Eero, due to the fact that it uses ARP poisoning to intercept traffic.  It sounds a bit on the messy side, and like it may not always catch everything.  I did read one customer who seemed to indicate it was working well for him, but I’m skeptical.

Perhaps they could partner with Circle?  Update their hardware to work something like Circle does…  The Eero would be the perfect place to control it.

Other Alternatives to Circle?

I do believe there are a few other devices that could be your Internet router, then run Eero in bridge mode, allowing the router to do all the filtering.  One that looks pretty good is the torch router, but at $249, it’s pricey, especially considering the money spent on the Eero system.  And the torch router includes Wifi, which we don’t really need with the Eero.

August 16, 2016 at 8:43 pm 1 comment

Eero – A few weeks in

I’ve been running with the Eero Wifi system in my home for a few weeks now.  I did have an issue where the IOS app stopped seeing devices as they connected and disconnected from my network.  Ultimately, I seemed to have fixed it, though I’m not entirely sure how.

My troubleshooting basically consisted of disconnecting the switches from each other and the power from all the Eeros, booting up my main Eero and waiting until it was online, then attaching each switch, one at a time, finally adding back the other Eeros.  That’s the basic idea at least.  I ended up taking a few switches out, as I didn’t need them with the improved WiFi coverage.

My network consisted of daisy-chained Ethernet switches…  Not the best design – It would have been better to have a central switch and home-run a CAT5 from each of the rooms to the central switch.

Anyhow, my network was basically like so:

Living Room: Two switches
Bed Room: Two switches
Den: Two switches

LR was linked to BR with a CAT5 cable, and BR was linked to the Den with a CAT5 cable.

Since each room now has a wire attached Eero access point, I took the step of removing a switch from the Bed Room and Den, giving me fewer overall hops.

Anyhow, I think this problem has been fixed now for a little over a week.

Other than that issue, which seems to be resolved now, it’s been pretty great in terms of WiFi coverage.

 

August 16, 2016 at 7:49 pm Leave a comment

Eero surprise

I just had a surprising discovery about my Eero.  I made a mistake!

On Thursday evening, I installed it in my home.  First, I attached it to my cablemodem, as instructed by the iPhone app, then I attached two more units to my network in other parts of my home.  Everything has been working well since.

I remembered a day or two ago thinking about that main Eero unit.  I didn’t seem to remember attaching it to my primary ethernet switch.  But I must have, right?  It’s been working fine.

Tonight, I was in the living room where the main Eero is, and I looked at it, only to find that it had a single ethernet cable attached, which runs to my cablemodem.  It was not physically connected to my network at all!

As it turned out, at least one of the other Eero units has been connected back to the main Eero using the wifi mesh.  And my network has been working very well.  We’ve been streaming Netflix, stream shows on the AppleTV from the cloud, playing an MMO game, etc.

So, congratulations Eero – the fact that my entire network was connected to the Internet across your wifi mesh, and I didn’t notice… Well, that’s great!

I did correct this issue this evening by adding a cable from the main Eero to my primary ethernet switch.  I understand that some lag was introduced in an MMO game for about 20 seconds or so when I attached it, but it seemed to adjust to the network topology change and keep right on going.

July 24, 2016 at 8:49 pm Leave a comment

Eero arrives – First look

My three pack of Eero devices arrived today.  I attached them each to a ethernet switches around my home, so I’m not using the wireless mesh capabilities of these units.

Installation went very smoothly.  I performed a quick series of speed tests (using the Ookla speed test app).  Virtually everywhere inside my home, I’m now getting speeds in excess of 40 Mbps down.  Close to an Eero?  Closer to 85-95 Mbps.  Out around the pool, I got around 30 Mbps for the most part, with one exception around 10 Mbps..

The parental controls features of the Eero aren’t quite what I had hoped.  When I think Parental Controls, I think internet filtering.  In the Eero, at least in the current form, it appears that this only covers grouping devices to a person, and having the ability to set schedules for when those devices have Internet access, pausing the Internet, and that sort of thing.   A similar feature advertised by Luma appeared to do things like this, plus filtering. I understand they have been putting out multiple updates each month, so hopefully a future update will include filtering based on family profile settings.

I’ve experimented with multiple access points in my home before, and those experiments always seemed to not work out quite as well as I had hoped.  If you give them different SSIDs, you have to switch networks from time to time, depending on where you are.  If you name the SSID the same on multiple APs, I’ve found issues with wireless devices “sticking” to a given AP.  Say you are in one part of the house, connected to AP1, and you move to another part of the house, near AP2.  It seems that as long as AP1 is somewhat within range, your wireless device will stay connected to it, even though there is a better signal available.

I have not really seen this problem with the Eero.  If I walk around my home, it seems like my iPhone moves to whichever Eero I’m closest to, judging by the number of bars my iPhone shows.  So far, I’m pretty impressed with the coverage.  I’ve generally wired most devices, but that may change with the Eero system in my home…

Hopefully, I’ll have more news to report in the next few weeks or so.

Update:  I removed part of this entry related tosomething  I thought was not in Eero yet, but I found it the next morning.

July 21, 2016 at 10:54 pm Leave a comment

Older Posts


Calendar

November 2017
S M T W T F S
« May    
 1234
567891011
12131415161718
19202122232425
2627282930  

Posts by Month

Posts by Category