Accessing VM on LAN interface when connected via WAN interface
-
I have a pfSense 2.0.3 box installed behind my Cisco ASA firewall / router via the pfSense WAN connection. I also have several VMs and other equipment on various VLANs and subnets on the LAN side of the pfSense box. When connected to the LAN side of the pfSense box everything works great. However, when I VPN into the Cisco ASA I would like to be able to acces the various equipment on the LAN side of the connection just as I would when connected directly to the LAN. Unfortunately, the best I have come up with so far is to NAT using Proxy ARP virtual IPs which leaves me with the scenario shown below…
VM on LAN: 192.168.1.12
pfSense WAN: 192.168.46.2
pfSense LAN: 192.168.1.1
WAN Subnet: 192.168.46.0 /24
LAN Subnet: 192.168.1.0 /24
Virtual IP for VM on WAN: 192.168.46.12IP Handed out by Cisco ASA: 192.168.47.0 /24
Connecting to the VM via RDP works if I RDP to 192.168.46.12 however I cannot RDP to 192.168.1.12 unless I am directly connected to the LAN. I would like to always be able to RDP to 192.168.1.12 regardless if I am directly connected to the LAN or connected to the WAN via the Cisco ASA firewall. Hopefully this makes sense. Any help would be greatly appreciated!
-
You should be able to do this just with some internal routes and pass rules.
- On Cisco add a route to 192.168.1.0/24 through pfSense WAN 192.168.46.2 (and that route will need to be pushed to the VPN clients that connnect to the Cisco, however you do that)
- On pfSense WAN add firewall rule to pass all source 192.168.46.0/24 destination 192.168.1.0/24 (or be more restrictive if you need to be)
-
Thanks for the tips… any chance I could make this work without needing to modify the Cisco ASA settings? I may not have access to this device.
-
Thanks for the tips… any chance I could make this work without needing to modify the Cisco ASA settings? I may not have access to this device.
I can't think how to do that - the Cisco needs to know somehow that the pfSense WAN IP is a gateway to 192.168.1.0/24
Your NAT solution is the standard way, essentially faking the pfSense LAN side address using a WAN side address that the Cisco is already happy to talk with.
By the way, if you do change the Cisco to add a route to 192.168.1.1 then you will have trouble when you VPN in to the Cisco from your favourite cafe/friend's house that is using 192.168.1.0/24 locally. If possible, I would change the LAN subnet to something less common - out of the 10.0.0.0/8 space or 172.16.0.0/12 space or down the end of 192.168.0.0/16.