• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Network design questions

Scheduled Pinned Locked Moved General pfSense Questions
1 Posts 1 Posters 851 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    jason0
    last edited by Oct 18, 2013, 7:13 PM

    Hello,

    I have designed four different network layouts.  The network shows a colocation and my office connected both to the Internet.  The systems at the colocation facility serve as web servers with some ftp and scp access.  There is a need for at least one other service system to do things such as dns, email relaying, etc.  I expect no incoming internet access to this system.

    The dmz lan is an rfc1918 lan and firewall A uses VIP addresses with a 1:1 nat into the systems in the dmz.

    I also need there to be a vpn between my office and the colocation network.  This vpn would allow me complete access to the systems on the network.  I just wonder which network design is better, and/or if there is some sort of best practice I could use.

    Drawing number one is the current network: in theory, the firewall rules allow only web traffic and the ipsec vpn to terminate.  However, I need some sort of Core lan, that would allow things such as backups, nfs mounts etc.  I hesitate to use the dmz lan for this, even though it's "firewalled", thus drawing two:

    Drawing two is another idea of mine: the vpn terminates on firewall b and the core lan is only accessible via the ipsec vpn to my office.  My perceptions are:

    • if fwA or the LAMP server is hacked, access is only granted to the dmz

    • however, since fwA forwards ipsec to fwb, fwb is directly exposed to the internet via the ipsec ports.  so is my previous perception false?

    Drawing three probably defeats the purpose of having a second firewall: if the LAMP server is compromised, then the Core lan is accessable.

    Drawing four adds an additional layer: a second ipsec tunnel encapsulated within the first ipsec tunnel: the first tunnel is between the exterior firewalls of both my office and colo.  the second tunnel connects between the second layer firewalls and traverses through the first vpn tunnel.

    Is it possible to have an ipsec tunnel within a second one, and is drawing four too complicated?

    I welcome any of your suggestions.
    one.png
    one.png_thumb
    two.png
    two.png_thumb
    three.png
    three.png_thumb
    four.png
    four.png_thumb

    1 Reply Last reply Reply Quote 0
    1 out of 1
    • First post
      1/1
      Last post
    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
      This community forum collects and processes your personal information.
      consent.not_received