A pfSense newbie here. I have a configuration question. I understand 
Cisco PIX configs well enough to describe the goal. I am trying to 
translate this concept to pfSense. Let me describe my network a little.

This is a typical "belt and suspenders" configuration with dissimilar
firewalls for the perimeter and inside firewall.  

  ISP assigned publicly available network: 1.2.3.128/27
  DMZ : 192.168.90.0/24
  LAN : 192.168.100.0/24

  Router inside address: 1.2.3.129

  Perimeter Firewall = fw01, outside address = 1.2.3.130
  (pfSense)                  inside address = 192.168.90.1

  Inside Firewall = fw02, outside address = 192.168.90.2
  (PIX 506e)              inside address = 192.168.100.1

This was a very simple and easy install! (once I got a motherboard that
would allow me to set the cylinders and sectors on the hard drive)

I offer HUGE Kudos to you guys. I wanted FreeBSD and pf, but didn't 
feel comfortable securing it myself. pfSense IS the perfect answer!

I am operational. I have simple NAT setup. I had NOTHING in the DMZ, 
until now. The current config has been serving us well for several weeks.

The following is what I would do using a PIX config to allocate a portion
of the block of 32 addresses to be used as publicly available addresses
going to servers, and the remainder as addresses set aside for inside
users going out. (this config is of course quite stripped down)

----------------------------------------------------------------------------
--
  ip address outside 1.2.3.130 255.255.255.224
  ip address inside 192.168.90.1 255.255.255.0

  access-list public-in permit tcp any host 1.2.3.131 eq smtp
  access-list public-in permit tcp any host 1.2.3.132 eq https
  access-group public-in in interface outside

  nat (inside) 1 192.168.90.0 255.255.255.0 0 0
  nat (inside) 2 192.168.100.0 255.255.255.0 0 0

  static (inside,outside) 1.2.3.131 192.168.90.131 netmask 255.255.255.255 0
0
  static (inside,outside) 1.2.3.132 192.168.90.132 netmask 255.255.255.255 0
0

  global (outside) 2 1.2.3.138-1.2.3.150 netmask 255.255.255.224
  global (outside) 1 interface

  route outside 0.0.0.0 0.0.0.0 1.2.3.129 1
  route inside 192.168.100.0 255.255.255.0 192.168.90.2 1
----------------------------------------------------------------------------
--

I setup the 1:1 NAT for the two servers. In each case, I used /32 for the 
subnet mask. Is this correct?

Not only can they not be seen by the outside, they cannot SEE the outside. 
I figured that the server SHOULD be able to see out since the LAN can. The 
DMZ got the default rule and I added a rule for the LAN. If I change the 
IP to any other address on the DMZ, I can see out. But the two 1:1 
addresses cannot. I also added a rule specific to them to enable them to 
see out. No help.

I read in one of the m0n0wall docs that the problem is that I need to 
enable Advanced Outbound NAT. I currently have Enable IPSEC passthru set. 
My confusion comes when I attempt to Enable Advanced OutBound NAT and 
then setup the mappings.

Even though we are using only two servers today, there will ultimately 
be 15 publicly used ip address going to servers. DomainA has 7, allocated 
at the top of the subnet (.131 - 137) and DomainB has 8, allocated at the 
bottom of the subnet (.151 - .158). This is because there are two different 
companies on site. They can each grow towards the middle.

Is this config possible using pfSense? Any advice? Thanks in advance.

Jeff

(I am not offended by RTFM when accompanied by appropriate links.)


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to