Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Correct DMZ setup

    Scheduled Pinned Locked Moved Routing and Multi WAN
    7 Posts 3 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      joshuamichaelsanders
      last edited by

      This is a repost of a thread on the NAT board. I've locked that topic and am reposting here because this is properly a routing question. I'm trying to figure out the best way to setup a DMZ network. The network design is attached but I'm having a problem with how to configure my pfsense instances.

      My question is specifically about a web server in the DMZ network. If I make the default gateway on that box point toward the internal PFsense at 192.168.200.2 I can poll the server internally but not externally through the 1:1 NAT I've setup on the external PFsense at 192.168.200.1. If I point the webserver toward the external PFSense at 192.168.200.1 I can access the server through the 1:1 NAT on the external PFsense but can't access anything on that box from the internal Firewall. Everytime the logs are littered with TCP:S which leads me to believe….I don't know what to believe at this point.
      DMZLevel3.jpg
      DMZLevel3.jpg_thumb

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        The default gateway should be the external firewall.
        For the internal LAN subnet you have to add a static route to the web server pointing to the internal firewall.

        1 Reply Last reply Reply Quote 0
        • J
          joshuamichaelsanders
          last edited by

          That's what I thought but when I do that I can't connect to anything TCP related from the internal network. Probably not related but OSPF is the routing protocol of choice between the corporate environment and the internal firewall. Are you saying add a route on the actual windows box using "net add….."?

          1 Reply Last reply Reply Quote 0
          • J
            joshuamichaelsanders
            last edited by

            OK, I've got it working with static routes. I configured a WAN & a LAN gateway on the external pfsense and created a Static Route for my workstation's subnet on the external pfsense pointing it back to the LAN gateway. Everything works smoothly. If I delete that static route and install Quagga OSPF, configure the LAN interface on the external box, my ICMP packets go through fine and I'm able to ping anything on the DMZ subnet but nothing TCP related goes through. I've got a simple webserver serving up a "Hello World' page. With the static route I'm able to see the page. With OSPF, I get nothing, it doesn't go thru

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              Putting servers between two routers like that is a horrible, horrible design. That DMZ should be an interface off one of the firewalls.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • J
                joshuamichaelsanders
                last edited by

                @Derelict:

                Putting servers between two routers like that is a horrible, horrible design. That DMZ should be an interface off one of the firewalls.

                Derelict, I'm curious to know why. I'm working with an existing design but probably have some latitude to change it. You think it should be like this?

                ![2017-03-28 08_24_14-Drawing1 - Visio Professional.png](/public/imported_attachments/1/2017-03-28 08_24_14-Drawing1 - Visio Professional.png)
                ![2017-03-28 08_24_14-Drawing1 - Visio Professional.png_thumb](/public/imported_attachments/1/2017-03-28 08_24_14-Drawing1 - Visio Professional.png_thumb)

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Because, as you are finding out, the servers need to know how to route the different traffic. They can't just have a default gateway. You end up with asymmetric routing, hairpinning, NAT reflection, etc.

                  Yes. That looks much, much better. Note that the web server no longer has any routing decisions to make. It just sends everything to the inside firewall and it makes all those decisions for it.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.