Re: [pfSense Support] Configuration with Public IP DMZ

2006-09-28 Thread Michael Schuh

Hi,

first thanks for your work and hints, but
i have seen the entrys in forum and faq, but this covers not my problem.
I think you have not really understand what i would, or better i have
not clearly enough described my problem.

Our ftp-server is on an public ip-address (our complete dmz).
so that i have to make no nat on DMZ interfaces/addresses.
The soulution that you have described is only really valid on
private addresses on DMZ like 192.168.1.24 or so (i think)

 WAN DMZ  LAN
213.135.2.225/28---213.135.2.240/28--192.168.1.0

And therfore i can not change our public ip addresses
(on the servers) like change it to private to opreate with the known
configuration as described by you and the entrys in the forum.

possibly i think to strange for configuration
(this may results from iptables and other config strategies).

i would only redirect connects incoming on the WAN/LAN-Interface for
DMZ-IP 247 port = ftp
but not all connects on the WAN-IP to port = ftp ! this is important because
we would later run a second ftp-server or soand with the described solution
this is impossible, or i must eventually spend a second virtual ip
from my WAN-NET.

i hope so you and the others understand what i like to get.


thanks for all

regards

michael

2006/9/28, Holger Bauer [EMAIL PROTECTED]:

This is extensively covered at the forum and there even is a faq entry at 
faq.pfsense.com (I think).

However, quick guide:
- Delete all NAT/firewallrules you created for the ftpserver (most likely wrong 
as it doesn't work) to start over.
- at interfaceswan enable ftp helper
- at firewallnat, portforward create a portforward: interface WAN, interfaceadress, 
port 21, destination internal ftp server IP, port 21
- save (nothe te text in the apply message that it created a rule for the 
ftp-helper
- apply

That's it

Holger

-Ursprüngliche Nachricht-
Von: Michael Schuh [mailto:[EMAIL PROTECTED]
Gesendet: Do 28.09.2006 12:28
An: support@pfsense.com
Cc:
Betreff: [pfSense Support] Configuration with Public IP DMZ



Hi,

i have pfsense taked yesterday in production use
(SNAPSHOT from 2006-09-26).
My configuration is
wan public.226/28
DMZ public.241/28
lan privateip/24

now i have the Problem my config for ftp-proxying our ftp-server
is probably wrong. i can connect to the ftp, but it passed only
one type of ftp-connect's (active or passive, be not sure).

i say our ftp.server is on public.247 so i must redirect all
ftp connects to the ftp-proxy-helper, but i be not sure how.

i have diabled the automatic nat rules, and need also the right
rules for outboud ftp sessions.
at the time i have configured outbound nat only for
our privatenet except the DMZ-NET.

Another question is abount /etc/sysctl.conf. I have made
an entry for proxyarp, while out interconnect disconnects the
dmz-nt if they get no arp addresses (for me this is bullshit, 
security-leak)
but he doesn't work otherwise.
Get the /etc/sysctl mangled or changes by an update? if so, if there
another possibility to change net.link.ether.inet.proxyall to 1 ?
(default 0 ).

thank a lot

regards

michael

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] Configuration with Public IP DMZ

2006-09-28 Thread Holger Bauer
As the ftp server has a routed public IP disable the ftp-helper at WAN (or keep 
it disabled, it is by default). Then all you need is firewallrules permitting 
tcp traffic from source any to destination public IP of ftp-server port 21 
and additional to that the portrange range that the ftp server uses. You don't 
need to portforward or nat.

Additionally I suggest enabling advanced outbound NAT. It will create a default 
NAT rule for your LAN subnet only. So NAT for the DMZ Interface is shut down by 
this (which you don't need in your setup). This way it should work with the 
above described firewallrules.

Holger

 -Original Message-
 From: Michael Schuh [mailto:[EMAIL PROTECTED]
 Sent: Thursday, September 28, 2006 4:02 PM
 To: support@pfsense.com
 Subject: Re: [pfSense Support] Configuration with Public IP DMZ
 
 
 Hi,
 
 first thanks for your work and hints, but
 i have seen the entrys in forum and faq, but this covers not 
 my problem.
 I think you have not really understand what i would, or better i have
 not clearly enough described my problem.
 
 Our ftp-server is on an public ip-address (our complete dmz).
 so that i have to make no nat on DMZ interfaces/addresses.
 The soulution that you have described is only really valid on
 private addresses on DMZ like 192.168.1.24 or so (i think)
 
   WAN DMZ  LAN
 213.135.2.225/28---213.135.2.240/28--192.168.1.0
 
 And therfore i can not change our public ip addresses
 (on the servers) like change it to private to opreate with the known
 configuration as described by you and the entrys in the forum.
 
 possibly i think to strange for configuration
 (this may results from iptables and other config strategies).
 
 i would only redirect connects incoming on the WAN/LAN-Interface for
 DMZ-IP 247 port = ftp
 but not all connects on the WAN-IP to port = ftp ! this is 
 important because
 we would later run a second ftp-server or soand with the 
 described solution
 this is impossible, or i must eventually spend a second virtual ip
 from my WAN-NET.
 
 i hope so you and the others understand what i like to get.
 
 
 thanks for all
 
 regards
 
 michael
 
 2006/9/28, Holger Bauer [EMAIL PROTECTED]:
  This is extensively covered at the forum and there even is 
 a faq entry at faq.pfsense.com (I think).
 
  However, quick guide:
  - Delete all NAT/firewallrules you created for the 
 ftpserver (most likely wrong as it doesn't work) to start over.
  - at interfaceswan enable ftp helper
  - at firewallnat, portforward create a portforward: 
 interface WAN, interfaceadress, port 21, destination 
 internal ftp server IP, port 21
  - save (nothe te text in the apply message that it created 
 a rule for the ftp-helper
  - apply
 
  That's it
 
  Holger
 
  -Ursprüngliche Nachricht-
  Von: Michael Schuh [mailto:[EMAIL PROTECTED]
  Gesendet: Do 28.09.2006 12:28
  An: support@pfsense.com
  Cc:
  Betreff: [pfSense Support] Configuration with Public IP DMZ
 
 
 
  Hi,
 
  i have pfsense taked yesterday in production use
  (SNAPSHOT from 2006-09-26).
  My configuration is
  wan public.226/28
  DMZ public.241/28
  lan privateip/24
 
  now i have the Problem my config for ftp-proxying 
 our ftp-server
  is probably wrong. i can connect to the ftp, but it 
 passed only
  one type of ftp-connect's (active or passive, be not sure).
 
  i say our ftp.server is on public.247 so i must redirect all
  ftp connects to the ftp-proxy-helper, but i be not sure how.
 
  i have diabled the automatic nat rules, and need 
 also the right
  rules for outboud ftp sessions.
  at the time i have configured outbound nat only for
  our privatenet except the DMZ-NET.
 
  Another question is abount /etc/sysctl.conf. I have made
  an entry for proxyarp, while out interconnect 
 disconnects the
  dmz-nt if they get no arp addresses (for me this is 
 bullshit, security-leak)
  but he doesn't work otherwise.
  Get the /etc/sysctl mangled or changes by an 
 update? if so, if there
  another possibility to change 
 net.link.ether.inet.proxyall to 1 ?
  (default 0 ).
 
  thank a lot
 
  regards
 
  michael
 
  
 -
  To unsubscribe, e-mail: [EMAIL PROTECTED]
  For additional commands, e-mail: [EMAIL PROTECTED]
 
 
 
 
  
 -
  To unsubscribe, e-mail: [EMAIL PROTECTED]
  For additional commands, e-mail: [EMAIL PROTECTED]
 
 
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED

Re: [pfSense Support] Configuration with Public IP DMZ

2006-09-28 Thread Michael Schuh

Hi,
2006/9/28, Holger Bauer [EMAIL PROTECTED]:

As the ftp server has a routed public IP disable the ftp-helper at WAN (or keep it 
disabled, it is by default). Then all you need is firewallrules permitting tcp 
traffic from source any to destination public IP of ftp-server port 21 and 
additional to that the portrange range that the ftp server uses. You don't need to 
portforward or nat.

Yes this is configured, except the other ports.
and yes the other ports are my problem. but im not sure what ports
are to openi have found an hint to 9500 to ,
the config say not much about this ...oh i have found it 49152-65535 on FBSD,
if i be rigth there...


Additionally I suggest enabling advanced outbound NAT. It will create a default 
NAT rule for your LAN subnet only. So NAT for the DMZ Interface is shut down by 
this (which you don't need in your setup). This way it should work with the 
above described firewallrules.

i have this also checked, and no automagically created nat rule.
i vahe made a NO NAT rule for the DMZ-Target, and an outbound NAT rule for
the whole internal private net except the DMZ-Subnet.
Here im not sure if the exception should cover the complete public ip-range
here 213.135.2.224/27


thanks for your help

cheers

michael


Holger

 -Original Message-
 From: Michael Schuh [mailto:[EMAIL PROTECTED]
 Sent: Thursday, September 28, 2006 4:02 PM
 To: support@pfsense.com
 Subject: Re: [pfSense Support] Configuration with Public IP DMZ


 Hi,

 first thanks for your work and hints, but
 i have seen the entrys in forum and faq, but this covers not
 my problem.
 I think you have not really understand what i would, or better i have
 not clearly enough described my problem.

 Our ftp-server is on an public ip-address (our complete dmz).
 so that i have to make no nat on DMZ interfaces/addresses.
 The soulution that you have described is only really valid on
 private addresses on DMZ like 192.168.1.24 or so (i think)

   WAN DMZ  LAN
 213.135.2.225/28---213.135.2.240/28--192.168.1.0

 And therfore i can not change our public ip addresses
 (on the servers) like change it to private to opreate with the known
 configuration as described by you and the entrys in the forum.

 possibly i think to strange for configuration
 (this may results from iptables and other config strategies).

 i would only redirect connects incoming on the WAN/LAN-Interface for
 DMZ-IP 247 port = ftp
 but not all connects on the WAN-IP to port = ftp ! this is
 important because
 we would later run a second ftp-server or soand with the
 described solution
 this is impossible, or i must eventually spend a second virtual ip
 from my WAN-NET.

 i hope so you and the others understand what i like to get.


 thanks for all

 regards

 michael

 2006/9/28, Holger Bauer [EMAIL PROTECTED]:
  This is extensively covered at the forum and there even is
 a faq entry at faq.pfsense.com (I think).
 
  However, quick guide:
  - Delete all NAT/firewallrules you created for the
 ftpserver (most likely wrong as it doesn't work) to start over.
  - at interfaceswan enable ftp helper
  - at firewallnat, portforward create a portforward:
 interface WAN, interfaceadress, port 21, destination
 internal ftp server IP, port 21
  - save (nothe te text in the apply message that it created
 a rule for the ftp-helper
  - apply
 
  That's it
 
  Holger
 
  -Ursprüngliche Nachricht-
  Von: Michael Schuh [mailto:[EMAIL PROTECTED]
  Gesendet: Do 28.09.2006 12:28
  An: support@pfsense.com
  Cc:
  Betreff: [pfSense Support] Configuration with Public IP DMZ
 
 
 
  Hi,
 
  i have pfsense taked yesterday in production use
  (SNAPSHOT from 2006-09-26).
  My configuration is
  wan public.226/28
  DMZ public.241/28
  lan privateip/24
 
  now i have the Problem my config for ftp-proxying
 our ftp-server
  is probably wrong. i can connect to the ftp, but it
 passed only
  one type of ftp-connect's (active or passive, be not sure).
 
  i say our ftp.server is on public.247 so i must redirect all
  ftp connects to the ftp-proxy-helper, but i be not sure how.
 
  i have diabled the automatic nat rules, and need
 also the right
  rules for outboud ftp sessions.
  at the time i have configured outbound nat only for
  our privatenet except the DMZ-NET.
 
  Another question is abount /etc/sysctl.conf. I have made
  an entry for proxyarp, while out interconnect
 disconnects the
  dmz-nt if they get no arp addresses (for me this is
 bullshit, security-leak)
  but he doesn't work otherwise.
  Get the /etc/sysctl mangled or changes by an
 update? if so, if there
  another possibility to change
 net.link.ether.inet.proxyall to 1 ?
  (default 0 ).
 
  thank