Re: [pfSense Support] Routing Multiple Static IPs

2010-10-16 Thread Justin The Cynical
On 10/15/10 8:12 PM, li...@mgreg.com wrote:
 Hi All,
 
 Having a bit of a problem wrapping my head around a particular network setup. 
  Basically the scenario is as follows:
 
 -- 1 ISP (Cable Internet Provider)
 -- 5 Available static IPs
 -- 1 Cable Modem
 -- 1 Generic PC with 2 NICs (running pfSense)
 -- 1 Gigabit Switch with 20+ PCs connected
 
 
 The current physical setup is as follows:
 
 ISP (5 STATIC IPs) -- CABLE MODEM -- pfSense Box (2 NICs) -- 32-port Gb 
 Switch -- 20+ PCs
 
 
 I need to be able to do each of the following:
 
 1)  Connect a router downstream from the pfSense box to use 1 of the 5 
 available IPs -- so as to segregate networks
 2)  Route all traffic from 2 of the 5 available static IPs to a single PC 
 whilst maintaining their internal (10.0.0.x) status.
 
 I'm not really sure what I need to be looking into for this -- VLANs, BGP, 
 General Multihoming, NAT?  Do I need more hardware?  Be as descriptive as you 
 deem necessary.
 
 Currently the entire network is just running off a single static IP address 
 (i.e. a run-of-the-mill cable internet setup with pfSense box as the router)

Comcast business account?  :-)

You will want to look into virtual IP's and NAT or port forwarding,
perhaps VLANs as well for the internal networking to create some sort of
DMZ.  It depends on what you are trying to set up or if you are trying
to preserve an existing configuration.

I'm using a mix of advanced outbound NAT, port forwarding and virtual
IP's, works a treat.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Routing Multiple Static IPs

2010-10-16 Thread Lyle Giese
li...@mgreg.com wrote:
 Hi All,

 Having a bit of a problem wrapping my head around a particular network setup. 
  Basically the scenario is as follows:

 -- 1 ISP (Cable Internet Provider)
 -- 5 Available static IPs
 -- 1 Cable Modem
 -- 1 Generic PC with 2 NICs (running pfSense)
 -- 1 Gigabit Switch with 20+ PCs connected


 The current physical setup is as follows:

 ISP (5 STATIC IPs) -- CABLE MODEM -- pfSense Box (2 NICs) -- 32-port Gb 
 Switch -- 20+ PCs


 I need to be able to do each of the following:

 1)  Connect a router downstream from the pfSense box to use 1 of the 5 
 available IPs -- so as to segregate networks
 2)  Route all traffic from 2 of the 5 available static IPs to a single PC 
 whilst maintaining their internal (10.0.0.x) status.

 I'm not really sure what I need to be looking into for this -- VLANs, BGP, 
 General Multihoming, NAT?  Do I need more hardware?  Be as descriptive as you 
 deem necessary.

 Currently the entire network is just running off a single static IP address 
 (i.e. a run-of-the-mill cable internet setup with pfSense box as the router)



 Best,

 Michael

   
Not sure what you are going to use the second box for or why, but I
would consider putting a switch between the cable modem and pfsense and
just use on of the static ip addresses directly and not put that traffic
through the existing pfsense box.

We do that for one of our larger clients and provide views in dns so
that the internal pc's get different ip address for mail or the company
website so that traffic never hits the routable ip addresses. The
webserver and mail servers are dual homed with external and internal ip
addresses.

Lyle



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



RE: [pfSense Support] Routing Multiple Static IPs

2010-10-16 Thread Adam Van Ornum


 From: li...@mgreg.com
 Date: Sat, 16 Oct 2010 20:47:51 -0400
 To: support@pfsense.com
 Subject: Re: [pfSense Support] Routing Multiple Static IPs
 
 
 On Oct 16, 2010, at 9:16 AM, Lyle Giese wrote:
 
  li...@mgreg.com wrote:
  Hi All,
  
  Having a bit of a problem wrapping my head around a particular network 
  setup.  Basically the scenario is as follows:
  
  -- 1 ISP (Cable Internet Provider)
  -- 5 Available static IPs
  -- 1 Cable Modem
  -- 1 Generic PC with 2 NICs (running pfSense)
  -- 1 Gigabit Switch with 20+ PCs connected
  
  
  The current physical setup is as follows:
  
  ISP (5 STATIC IPs) -- CABLE MODEM -- pfSense Box (2 NICs) -- 32-port Gb 
  Switch -- 20+ PCs
  
  
  I need to be able to do each of the following:
  
  1)  Connect a router downstream from the pfSense box to use 1 of the 5 
  available IPs -- so as to segregate networks
  2)  Route all traffic from 2 of the 5 available static IPs to a single PC 
  whilst maintaining their internal (10.0.0.x) status.
  
  I'm not really sure what I need to be looking into for this -- VLANs, BGP, 
  General Multihoming, NAT?  Do I need more hardware?  Be as descriptive as 
  you deem necessary.
  
  Currently the entire network is just running off a single static IP 
  address (i.e. a run-of-the-mill cable internet setup with pfSense box as 
  the router)
  
  
  
  Best,
  
  Michael
  
  
  Not sure what you are going to use the second box for or why, but I
  would consider putting a switch between the cable modem and pfsense and
  just use on of the static ip addresses directly and not put that traffic
  through the existing pfsense box.
  
  We do that for one of our larger clients and provide views in dns so
  that the internal pc's get different ip address for mail or the company
  website so that traffic never hits the routable ip addresses. The
  webserver and mail servers are dual homed with external and internal ip
  addresses.
  
  Lyle
 
 
 Thanks Lyle,
 
 Basically we want a central point to monitor all incoming/outgoing traffic 
 regardless of the network.  We just figure since we already have the pfSense 
 box in place we'll passthrough for whatever else we need.  Also, we want all 
 but one of the boxes that get a STATIC IP to still be accessible internally.
 
 For instance, our ISP gives us a pool of addresses from 85.100.100.46 - 50 
 (not real, but play along).   The main pfSense box will have 85.100.100.46 
 and will also control all traffic.  Then we'll have one box that actually 
 *is* 85.100.100.47 that isn't visible on the local network, then another box 
 to which we simply pass all traffic that would otherwise route to  
 85.100.100.48 - 50, but is still accessible via 10.0.0.x on the local network.
 
 Obviously port forwarding is preferable in many cases, but in this particular 
 case there are several services running on these machines that would require 
 a great deal of port forwarding.  So, instead of doing that, we simply allow 
 them to have their own external IP.
 
 If there is no good way to do this (even via VLANs) from pfSense then I'll 
 request an additional switch.  But I don't want to suggest the spending of 
 more money unless 100% necessary.
 
 Thanks again for any help.
 
 Best,
 
 Michael


I think what you're looking for is a combination of Virtual IPs and possibly 
1:1 NAT.  I haven't actually tried that setup myself so someone with more 
experience might need to correct me, but you should be able to setup the public 
IPs as Virtual IPs on the WAN interface and then setup 1:1 NAT to then map the 
external IP to an internal IP.  My understanding of 1:1 NAT at least is that it 
is pretty much what you are looking for...it causes all traffic to an IP to be 
forwarded to the appropriate internal IP.  I'm pretty sure you still have to 
add rules to open up the firewall for those IPs too, so (if necessary, since 
it's not optimal from a security standpoint) you could just add a rule to pass 
any traffic with a destination set to the external Virtual IP.