Hello Alex,

Thanks for the response.

I have implemented  second case multiple time multiple times  when I create s2s 
between my firewall and end customer’s device, and then extend the connectivity 
from firewall to VR via Private Gateway and that works pretty perfect. But in 
this  particular case we can’t use firewall so that’s why I wanted to use any 
virtually appliance under a VPC which can give me any alternative, So how do we 
achieve the connectivity of Virtual appliance since Tier will use the private 
subnet so if I use the Static NAT with PFsense will it work ? Because in 
pfsense it will always identified as a private IP. 


Vivek Kumar


This message is intended only for the use of the individual or entity to which 
it is addressed and may contain information that is confidential and/or 
privileged. If you are not the intended recipient please delete the original 
message and any copy of it from your computer system. You are hereby notified 
that any dissemination, distribution or copying of this communication is 
strictly prohibited unless proper authorization has been obtained for such 
action. If you have received this communication in error, please notify the 
sender immediately. Although IndiQus attempts to sweep e-mail and attachments 
for viruses, it does not guarantee that both are virus-free and accepts no 
liability for any damage sustained as a result of viruses.

> On 30-Apr-2020, at 2:11 PM, Alex Mattioli <alex.matti...@shapeblue.com> wrote:
> 
> Hi Vivek,
> I've actually done exactly that with both PaloAlto and Checkpoint firewalls. 
> In one case created the VPC with a "public" IP in the same network as the 
> FW's Inside interface, which is a bit too much work to be honest (and can get 
> messy).
> In another case in a POC I just used the VPC's Private Gateway function to 
> connect it to the FW, which could then be either physical or virtual.
> 
> Cheers,
> Alex Mattioli
> 
> alex.matti...@shapeblue.com 
> www.shapeblue.com
> 3 London Bridge Street,  3rd floor, News Building, London  SE1 9SGUK
> @shapeblue
> 
> 
> 
> 
> -----Original Message-----
> From: Vivek Kumar <vivek.ku...@indiqus.com> 
> Sent: 29 April 2020 21:39
> To: users@cloudstack.apache.org
> Subject: Pfsense like external firewall with CloudStack
> 
> Hello Folks, 
> 
> Have someone ever tried to deploy a pfsense or any other virtual firewall 
> appliance under a VPC to extend the security feature. Let’s say if I want to 
> use site-to-site between my tiers and remote destination and I don’t want to 
> use VR for site-to-site. Has someone tried that scenario ?
> 
> Let me give an use case, I have a VPC with multiple Tier and VMs running, I 
> am using a old version of CloudStack 4.7.1  with XenServer 7.0 in this we 
> don’t have options to choose  options like  IKE Hash SHA256,384,512 and same 
> for ESP Hash , IKE DH group 14,15,16 ( which is pretty much available in 4.13 
> ).  So I want to establish a site-2-site using these security parameters 
> which doesn’t exist in my version of CloudStack. Is there any way to achieve 
> it for my older version ? So I wanted to check if someone has worked on this 
> scenario and use any third party firewall appliance. 
> 
> 
> 
> Vivek Kumar
> 
> 

Reply via email to