Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DMZ bridged to WAN cannot reach LAN

    Scheduled Pinned Locked Moved General pfSense Questions
    25 Posts 5 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • lalex86L
      lalex86
      last edited by

      Hi, you give us good and right suggestions....

      just to explain...

      In my case the (main) purpose is to use a NAS (freenas) in the LAN both as LAN file server (throught smb shares) and as repository for the git server in the DMZ.

      The best solution would be one NAS in the DMZ and a second NAS in the LAN that replicates or backups data in the DMZ (with a connection LAN to DMZ).... but we are a small office and we to deal with resources; so i decided to compromise using the same NAS in the LAN also for the DMZ server....

      Thx
      Alessandro

      T 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        So you understand there is risk, yet you choose to expose ALL of your data to the public, not just the git data?

        So who signs off on this risk? Is Tim's point ;)

        Get another nas for your git data.. Have your nas from your secure network back up the data.. Sorry your normal nas data that users access is now at risk.. Lets say the box is exploited... What keeps them from compromise of the data your users are accessing.

        You might be more secure leaving the nas in lan, and only allow pin hole from the git server to the git data that is isolated on its own volume/lun and only access via specific protocol from the git dmz server.. This reduces the protocols that are allowed through the firewall... Vs say http to the git server which would then have unfettered access to the nas since on the same network with no firewall between. If your going to do such a thing then you need to make sure all other protocols disabled or locked down with HOST firewall, etc. etc.. Or you put the nas in the internal dmz vs the external one like I was saying.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • T
          tim.mcmanus @lalex86
          last edited by

          @lalex86 said in DMZ bridged to WAN cannot reach LAN:

          Hi, you give us good and right suggestions....

          just to explain...

          In my case the (main) purpose is to use a NAS (freenas) in the LAN both as LAN file server (throught smb shares) and as repository for the git server in the DMZ.

          The best solution would be one NAS in the DMZ and a second NAS in the LAN that replicates or backups data in the DMZ (with a connection LAN to DMZ).... but we are a small office and we to deal with resources; so i decided to compromise using the same NAS in the LAN also for the DMZ server....

          Thx
          Alessandro

          I have a similar requirement at a client's office. Here was my general approach:

          Only give specific and limited access to devices that need to do this. So in pfSense you want to only open the ports/protocol necessary to make and maintain a SMB connection to the NAS. I think that's 3 ports. The point that you're mounting on the NAS should only contain the data that the server needs to access. Create a "service login" specifically for that server to use, and limit the access of that login only to the mount point with the data it needs to access.

          This way when the server gets breached, the bad actor can only access a SMB mount point that only contains that server's data. It will be very difficult for them to pivot from that point, but it does put your data at risk of corruption from a bad actor. With proper backups in place (and a reasonable RTO/RPO), you can minimize that risk.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            SMB should run over 1 port tcp 445... No need to open up the the old school netbios ports.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 1
            • BabizB
              Babiz @lalex86
              last edited by

              @lalex86 yes, you are missed basic's of networking security? ๐Ÿ˜‰

              I totally agree with @johnpoz and @stephenw10 write , but if you want explore new ways for make firewall-ing concept to work, I advice you to add , first of all ...more NIC on your server, and reserve one nic for DmZ and other to Lan.

              By this way , you can handle connections of any kind , with a proper configuration for each one, meets firewall-ing standard concept in mind. ๐Ÿฆ‰

              More nic's more fun! hahah lool

              Please forgive me ๐Ÿ˜

              T 1 Reply Last reply Reply Quote 0
              • T
                tim.mcmanus @Babiz
                last edited by

                @babiz said in DMZ bridged to WAN cannot reach LAN:

                @lalex86 yes, you are missed basic's of networking security? ๐Ÿ˜‰

                I totally agree with @johnpoz and @stephenw10 write , but if you want explore new ways for make firewall-ing concept to work, I advice you to add , first of all ...more NIC on your server, and reserve one nic for DmZ and other to Lan.

                By this way , you can handle connections of any kind , with a proper configuration for each one, meets firewall-ing standard concept in mind. ๐Ÿฆ‰

                More nic's more fun! hahah lool

                Please forgive me ๐Ÿ˜

                Oh, I disagree! Once you breach that one system, since it's on both networks, you now have access to both.

                BabizB 1 Reply Last reply Reply Quote 1
                • BabizB
                  Babiz @tim.mcmanus
                  last edited by Babiz

                  @tim-mcmanus You are right!
                  Anyway my next goal for next weeks is made like pfsense+xpenology virtualized together on linux based host and virtualbox!
                  I have no idea if this is enough "secure", but I love more nics on my Xeon older E5 bare metal 16 core cpu! ghhh just starting with 16 gb of ram, also I love Xeon motherboard arch. It's for tough server stuff. ๐Ÿบ ๐Ÿบ
                  Sorry for OT, I'm kiking out. ๐ŸŽƒ

                  1 Reply Last reply Reply Quote 0
                  • lalex86L
                    lalex86
                    last edited by

                    Thx all but you are going over what i'm saying and asking :).

                    You are writing referring to scenarios different from mine....:

                    • there are 3 (virtual because is all on a Proxmox environment) NICs (wan,lan,dmz)
                    • NAS is in the LAN
                    • the LAN contains only some virtual desktops accessed remotly
                    • the NAS has a share dedicated (with protocol and user credentials) to the host in the DMZ...
                    • actually all the virtual infrastructure is protected from a VPN and only the SSH port is opened to the DMZ with authentications with certificates...
                      Anyway the main purpose of this topic was to better understand about pfSense internals and routing.... not about security issues that I known.

                    Thx
                    Alessandro

                    1 Reply Last reply Reply Quote 0
                    • lalex86L
                      lalex86
                      last edited by

                      Moreover ...

                      Host in DMZ will run a git server and a owncloud server...

                      Where shoud owncloud files (usually replicas of private data) live?

                      thx
                      Alessandro

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        I think the main point here is that the best practice is to store only the minimal amount of data required in the DMZ and limit access to anything on the LAN to only what is required.

                        However you have to make some assessment of the risk. Is the git server going to be open to the world or only restricted source IPs?

                        The term DMZ used here implies it is exposed and needs to be walled off from other subnets but that might not be the case. Or at least not in the traditional sense.

                        Steve

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.