Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Transparent DMZ (on OPT) interface?

    General pfSense Questions
    4
    10
    2.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bluerains
      last edited by

      Is there a way where I can setup the 3rd (OPT) interface to be a "transparent" DMZ?  Where the interface does not have any public IP, but I can setup any device behind that interface with a public IP and it will be transparent to outside?  So what I mean is that on the OPT interface it will broadcast to outside (if allow by firewall rules) the public IP of the device behind it, no NAT, no translation, nothing.

      1 Reply Last reply Reply Quote 0
      • KOMK
        KOM
        last edited by

        Instead of asking a specific question, could you describe what you're trying to accomplish?  Usually you publish a server via port forwarding.

        1 Reply Last reply Reply Quote 0
        • B
          bluerains
          last edited by

          Well what I currently is a sonicwall, it has a physical port that is program as "transparent DMZ".  That port is hookup to a switch (is actually a VLAN inside a switch).  On the same switch I have server that has the public IP assign on the NIC directly.  Thus whatever IP on that server is "transparent" to the outside via this "transparent DMZ" port on sonicwall.

          Yes I know usually you would have a private IP on the server and then do NAT/port forward a public IP to the Private.  But in this case, the server HAS TO HAVE public IP on the NIC card.

          The reason this device has to have public IP on the NIC is because is a VoIP media gateway.  IF it has private IP, the SIP INVITE would have private IP and when that SIP INVITE message gets to far end, the far end does not know how to route back to "private" IP.

          So is that possible on pfSense?

          Thank you for your help!

          1 Reply Last reply Reply Quote 0
          • KOMK
            KOM
            last edited by

            I'm not sure I understand you.  NAT happens automatically when traffic goes through the firewall, so the destination would have the public IP of your pfSense WAN, not the internal system on LAN.  Firewall rules that you create allowing incoming traffic on the required ports destined for your PBX lets people call into it.  Lots of people run VoIP and SIP servers behind a firewall without having to have a configuration as you've described.  I'm not a VoIP expert so I may not fully understand your scenario, but I've never heard of needing this.

            To answer your question, I don't know how to do that.

            1 Reply Last reply Reply Quote 0
            • B
              bluerains
              last edited by

              Sorry maybe this would clear up.  We have /26 (roughly 60 usable ip) static public IP from our ISP.  Yes, there is a single public IP on the WAN port, but that is not the IP we've assign to the "other" devices.  So when I use one of "other" public IP on the device, when it goes out of pfSense, it will be carring that IP instead of the 'WAN" ip.

              Yes, we maybe able to run our SIP server using private, but currently they are all running using public IP so is simple, if pfSense can not do it, I may have to find other way, or the "hard" way is to find out how to modify our network to "fit" with limited pfSense capability.  I just want my options layout before I decide which way to go.

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                Ah OK.  Look at Virtual IPs (Firewall - Virtual IPs).  I have my one pfSense instance with 10 IP aliases.  One for the WAN IP, one for our FTP server which is port-forwarded, one for www, one for demo www, one for DNS1, one for DNS2, etc.  Virtual IP combined with port forward is what you're looking for.

                1 Reply Last reply Reply Quote 0
                • B
                  bluerains
                  last edited by

                  thank you very much for your help.  But what is your ftp server's NIC IP, is it private or public?

                  If is public then great, but if you are still talking about public to private port forwarding, then it would not work for my case.  In my case, the server's NIC has to be PUBLIC IP.  The reason is that when it generate the SIP message, it will grab the IP of the NIC and stuff it in and then sent it out.  Thus, if NIC have private IP,  once far end gets it, is useless.

                  1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM
                    last edited by

                    The FTP server is a virtual machine in VMware ESXi.  His only NIC is a private IP in the 172.16.1.0/24 range.

                    I don't know how this VoIP company expects people to use their products with their assumption that everyone loves to hang their gear out naked on the public Internet.  I don't have an answer for you.  Perhaps one of the smarter guys knows a solution.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      I would ask the ISP if they can assign a /29 or /30 (OR /31 IN 2.2??) for your WAN interface and route the /26 to you over that.  You'd have a lot more flexibility in how you use the addresses that way. (Like putting the /26 (or part of it) on an OPT interface and turning off NAT.)

                      An alternative might be to bridge WAN with OPT, then assign WAN to use BRIDGE0.  Anything you then plugged into OPT would effectively be out on the /26 with your WAN address.  But an outside switch can accomplish the same thing.  You lose essentially all firewalling capability this way.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • C
                        cthomas
                        last edited by

                        @Derelict:

                        I would ask the ISP if they can assign a /29 or /30 (OR /31 IN 2.2??) for your WAN interface and route the /26 to you over that.  You'd have a lot more flexibility in how you use the addresses that way. (Like putting the /26 (or part of it) on an OPT interface and turning off NAT.)

                        An alternative might be to bridge WAN with OPT, then assign WAN to use BRIDGE0.  Anything you then plugged into OPT would effectively be out on the /26 with your WAN address.  But an outside switch can accomplish the same thing.  You lose essentially all firewalling capability this way.

                        ^^^ What he said, Option 1.

                        Generally speaking, ISP's will give you a L2 point-to-point and a L3 routed block, most people install a router with the p2p (/30) on the front, and the routed block (/26) on the back-end. (You would then IP you firewall on the /26)  In this case, the router becomes a single point of failure.

                        Ask for an L2 /29 from the ISP so that you can support redundant pfSense Firewalls, then use your L3 /26 behind it on your DMZ interface.  You can still do NAT for certain hosts if you want by using VIPs, but you'll also be able to assign the public IP's directly to hosts by connecting them to the DMZ network.

                        [One day pfSense may support HA with smaller blocks (/30 or /31), but until then I would recommend a /29]

                        …ct

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.