I'm trying to set up the following:

           / <-> CARP
WAN int (PFSENSE BOX)<-> LAN
          \<-> DMZ

I want to have nat on the LAN, bi-nat on the DMZ, filtering incoming and outgoing traffic. I'm close, but I've had issues with trying to get this all working; I can't get outbound PASV ftp from the DMZ; I just want to be sure that pfsense is capable before I expend anymore energy on this. I can't find the traffic being blocked, nor do I see it connecting to the local proxy.

Let me know what else I can supply you with, here are some details:

The CARP interface is disabled till I get this working

(for below - x.x.x = external address scheme)

 OPT1(DMZ)*               ->   em0     ->      10.1.1.1
 LAN*                     ->   bge0    ->      172.16.128.15
 WAN*                     ->   xl0     ->      x.x.x.89

pfctl -sr | grep USER

pass in quick on xl0 inet proto tcp from any to x.x.x.68 keep state label "USER_RULE"

pass in quick on xl0 inet proto udp from any to x.x.x.68 keep state label "USER_RULE"

pass in quick on xl0 proto tcp from any to any port = ssh keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto tcp from any to any port = ntp keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto tcp from any to any port = domain keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto tcp from any to any port = ftp keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto tcp from any to any port = https keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto tcp from any to any port = http keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto udp from any to any port = ssh keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto udp from any to any port = ntp keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto udp from any to any port = domain keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto udp from any to any port = ftp keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto udp from any to any port = https keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 proto udp from any to any port = http keep state label "USER_RULE: Allowed incomming ports"

pass in quick on xl0 inet proto tcp from 139.142.2.2 port = domain to any keep state label "USER_RULE"

pass in quick on xl0 inet proto tcp from d.n.s.3 port = domain to any keep state label "USER_RULE"

pass in quick on xl0 inet proto udp from d.n.s.2 port = domain to any keep state label "USER_RULE"

pass in quick on xl0 inet proto udp from d.n.s.3 port = domain to any keep state label "USER_RULE"

pass in quick on xl0 inet proto tcp from any to 10.1.1.150 port >= 49152 flags S/SA keep state label "USER_RULE: FTP Passive ports"

pass in quick on em0 inet proto tcp from 10.1.1.0/24 to 127.0.0.1 flags S/SA keep state label "USER_RULE"

pass in quick on em0 all keep state label "USER_RULE"

pass in quick on bge0 inet proto tcp from 172.16.128.0/20 to 127.0.0.1 flags S/SA keep state label "USER_RULE"

pass in quick on bge0 inet proto tcp from 172.16.128.0/20 to any port = http flags S/SA keep state label "USER_RULE"

pass in quick on bge0 inet proto tcp from 172.16.128.0/20 to any port = https flags S/SA keep state label "USER_RULE"

pass in quick on bge0 inet proto tcp from 172.16.128.0/20 to any port = ftp flags S/SA keep state label "USER_RULE"

pass in quick on bge0 inet proto tcp from 172.16.128.0/20 to any port = ssh flags S/SA keep state label "USER_RULE"

pass in quick on bge0 inet proto tcp from 172.16.128.0/20 to any port = domain flags S/SA keep state label "USER_RULE"


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to