Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New Install from Smoothwall

    General pfSense Questions
    4
    21
    8.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      genius
      last edited by

      @stephenw10:

      Are you running 1.2.3 or 2.0?
      It shouldn't make much difference either way.
      LAN is the only interface with access by default. Just copy the LAN firewall rules to OPT1 (changing appropriate addresses) and it should work.

      Steve

      More…

      screen2.jpg
      screen2.jpg_thumb

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Hmm,
        The DMZ interface IP should be set to static (192.168.2.1) and dhcp enabled on that interface (a different section of the GUI: > services > DHCP server) if you need it.

        I think your problem lies in your setting outbound NAT to manual. As it says, if you do that then no auto rules are generated. Only set it to manual if you need some specific functionality.
        I have 6 interfaces on my 1.2.3 box and all working good with outbound NAT set to auto.

        Steve

        1 Reply Last reply Reply Quote 0
        • G
          genius
          last edited by

          @stephenw10:

          Perhaps it is having a problem with https?
          Looks like that might be the case from your examples.
          Have you played with the firewall rules? What is your WAN/s?

          Steve

          OK–I duplicated the problem with the https thing... again, totally my faulyt.  While I was setting up teh ports for the Tivo, I was blindly adding port numbers--among those was 443.  So essentially, I was routing the 443 (secure channels) back to the TIVO:S  LMAO!

          I moved it over to automatic.  I was following this link: http://www.tomschaefer.org/web/wordpress/?p=852 and I guess I misread it.  If I change it to automatic, I assume I need to rebuild the links to the DMZ.  I will check on it later and get back to you.  Thank you for your time!

          But also, I shouldn't have to build links for every port in/out of the DMZ, like port 80, 443 and so forth... the asterisk should cover it right?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            DMZ will behave exactly like LAN. No need to setup ports for outgoing traffic.
            The only difference is that LAN has a hidden firewall rule you can't remove to prevent you locking yourself out of the GUI, the anti-lockout rule.

            Steve

            1 Reply Last reply Reply Quote 0
            • G
              genius
              last edited by

              Hmm… no dice:(  See screen shot.

              The two rules work fine with the mail server on the LAN port.  But when I shift it to the DMZ port the connection can't be made.  What you are seeing is Gmail trying to send email to my mail server.  Also, I'm pretty sure there's no Internet access on that side.  I need to get back to the server and see if I can ping anything.

              When I do a telnet to port 25 the connection opens but the server's responses don't come back.

              compiled.jpg
              compiled.jpg_thumb

              1 Reply Last reply Reply Quote 0
              • chpalmerC
                chpalmer
                last edited by

                Remember rules read from top to bottom.

                If you have a rule that would somehow block that traffic before the rule to allow it you would be blocked…

                Also I think the gateway field on your DMZ interface should be its lan address or blank...  I could be wrong.

                Triggering snowflakes one by one..
                Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                1 Reply Last reply Reply Quote 0
                • chpalmerC
                  chpalmer
                  last edited by

                  Heres my office setup just for comparison…

                  Even though you are pointing all incoming at that interface I dont believe it should be that much different...

                  Im running 2.0

                  Good luck guys!

                  RouterBox.jpg
                  RouterBox.jpg_thumb

                  Triggering snowflakes one by one..
                  Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Hmm, OK.
                    I think we need more information here.
                    You are running 1.2.3, yes?
                    Could you describe your network, interfaces, servers, services and what you are trying to achieve.

                    Not completely sure what I'm looking at in your last picture:
                    Firewall logs
                    Wan firewall rules
                    Port forwarding rules

                    Yes?
                    If so then the firewall log is showing the firewall, correctly, blocking traffic to 192.168.1.10:9925.
                    Your wan firewall rules are allowing traffic to 192.168.2.10:9925. I.e. your port forwarding is forwarding to the wrong subnet!  :-
                    You need to refresh something. Perhaps reset the state table (under diagnostics) or just reboot.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • G
                      genius
                      last edited by

                      @stephenw10:

                      Hmm, OK.
                      I think we need more information here.
                      You are running 1.2.3, yes?
                      Could you describe your network, interfaces, servers, services and what you are trying to achieve.

                      Not completely sure what I'm looking at in your last picture:
                      Firewall logs
                      Wan firewall rules
                      Port forwarding rules

                      Yes?
                      If so then the firewall log is showing the firewall, correctly, blocking traffic to 192.168.1.10:9925.
                      Your wan firewall rules are allowing traffic to 192.168.2.10:9925. I.e. your port forwarding is forwarding to the wrong subnet!  :-
                      You need to refresh something. Perhaps reset the state table (under diagnostics) or just reboot.

                      Steve

                      Attached is a snapshot of my LAN just to give you an idea of what I have on it.  Just to be clear, my network is a learning network.  It has a bunch of Linux servers doing various things but strictly for learning.  Also I did catch that subnet error and fixed it but that didn't fix the problem.

                      On the LAN side I have it hooked to a Cisco 2900 VLAN1.  Also on the LAN side is the LAN side of a wireless router.  The router does nothing but grab wireless clients.  I also have an Amahi server (192.168.1.10) which runs SSHD, OpenVPN, ALS VPN, Postfix and Dovecot.  The email is in IMAP/S and listens on 9923.  It also has a Postfix which is listening on 9925.  Been meaning to change that to 25 but I never got around to it.  It also has a Tivo and Xbox and various other computers.

                      On the OPT1 is the same CISCO but VLAN2, 192.168.2.0.  This is where I have a CENTOS server running (192.168.2.10) which is configured EXACTLY the same as the services I have on the Amahi server.  I want that to be my dedicated Email server and sit in the DMZ.

                      I cloned the firewall rules which are forwarding ports 25 to 192.168.1.10:9925 and 9993 to 192.168.1.10:9993 to 192.168.2.10.  But only one pair is enabled.

                      Right now, I have DHCP enabled on the DMZ.  Centos is set up for DMZ and asks the DHCP for the DNS info.

                      The main issue I have is from the Centos server, I can ping 192.168.2.1 and it gets an address.  But I can't ping past it.

                      When I forward 9993 and 9925 into the DMZ, the connections go in but it doesn't let anything out.

                      setup1.jpg
                      setup1.jpg_thumb

                      1 Reply Last reply Reply Quote 0
                      • G
                        genius
                        last edited by

                        Here's a cut/paste from the routes table…

                        IPv4
                        Destination Gateway Flags Refs Use Mtu Netif Expire
                        default         69.255.102.1         UGS 0 312358 1500 xl0
                        69.255.102.0/23 link#1                 UC 0 0 1500 xl0
                        69.255.102.1 00:01:5c:23:d5:01 UHLW 2 690 1500 xl0 1200
                        My WAN IP         127.0.0.1                 UGHS 0 0 16384 lo0
                        127.0.0.1         127.0.0.1                 UH 1 2407 16384 lo0
                        192.168.1.0/24 link#3                 UC 0 0 1500 fxp0
                        192.168.1.8         00:11:d9:0a:6b:46 UHLW 1 1170 1500 fxp0 1185
                        192.168.1.10 00:11:43:d8:ec:21 UHLW 1 1427 1500 fxp0 1193
                        192.168.1.31 a4:ed:4e:be:f0:f8 UHLW 1 32 1500 fxp0 421
                        192.168.1.35 44:2a:60:bf:30:8b UHLW 1 124 1500 fxp0 1118
                        192.168.1.41 00:1f:e2:3a:a3:5b UHLW 1 1278 1500 fxp0 124
                        192.168.2.0/24 link#2                 UC         0 0 1500 xl1

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Why are you port forwarding external DNS (53) to DMZ? This could be a problem preventing dns working correctly from inside the DMZ.

                          Anyway it looks like your learning network is working!  ;)

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • G
                            genius
                            last edited by

                            @stephenw10:

                            Why are you port forwarding external DNS (53) to DMZ? This could be a problem preventing dns working correctly from inside the DMZ.

                            Anyway it looks like your learning network is working!  ;)

                            Steve

                            Oh yea–I need to ditch that one.  That was one of my desperate attempts to get internet on the DMZ.  ThAt tge time, I was gumbling with an unfamiliar interface and thought I was creating an outbound rule.  Thanks for the catch!  Wouldn't that be great if that was the problem???  LOL!

                            THANKS FOR YOU TIME!

                            1 Reply Last reply Reply Quote 0
                            • G
                              genius
                              last edited by

                              Oh yea–1.2.3.

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                @genius:

                                Oh yea–1.2.3.

                                Better late than never!  :P

                                I think the root of the problem here is that you have tried to do too many things at once, one of those things hasn't gone well but it's hard to pin down. You should go one step at a time, testing as you go.
                                E.g. if it's outbound internet access that isn't working then that's pretty fundamental but very easy to test.

                                I realise it's very tempting to just try to directly replicate the functionality of your Smoothwall setup in one go, that's what I did coming from IPCop but I guess I was just lucky.  ::)

                                Steve

                                1 Reply Last reply Reply Quote 0
                                • G
                                  genius
                                  last edited by

                                  Probably right.  Yesterday I discovered the Tivo could connect to its service but could not download Netflix videos.  I also discovered the Xbox 360 couoldn't connect to Live because of an invalid MTU.  I did everything the forums told me indluding turning the Upnp but no dice.

                                  Wife got ticked.  Had to throw slap the Smoothwall drive back in.  I may give this one a break and check out Monowall or Untangle.  Thanks again though!

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.