• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Password protecting a forward, is it possible?

Scheduled Pinned Locked Moved NAT
9 Posts 3 Posters 3.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • V
    vladk
    last edited by Apr 13, 2015, 3:07 PM

    We moved from cisco to pfsense and one of the features I can not figure out is password protecting a route/forward.

    So if we have a forward to ports 80/443 from external ip to internal server, I'd like to password protect it.

    Only people with login/pw should be able to hit that port and after logging in see the site that's on the server behind.

    This feature was easy on cisco but I can not figure out how to do that in pfsense. Is something like that available? If not, is there any other way to secure the sites on internal server but still make them accessible from outside?

    Thanks.

    1 Reply Last reply Reply Quote 0
    • K
      KOM
      last edited by Apr 13, 2015, 3:23 PM

      No, there is no such method on pfSense.  Usually, one puts a password on the resource being accessed.  Assuming your'e talking about a web server, there are a zillion ways to limit access based on credentials.

      1 Reply Last reply Reply Quote 0
      • V
        vladk
        last edited by Apr 13, 2015, 3:55 PM

        Do you mind naming one that will lock down the whole server (with dozens of sites) but only to outside world and not to internal network?

        Thanks.

        p.s. server is windows 2012 r2 running IIS.

        1 Reply Last reply Reply Quote 0
        • K
          KOM
          last edited by Apr 13, 2015, 5:04 PM

          Do you mind naming one that will lock down the whole server (with dozens of sites) but only to outside world and not to internal network?

          That wasn't your original requirement.  I'm not aware of a way to make a Windows box do a challenge only on access from a particular network, but I'm not a Windows magician.  It's simple under Apache.

          1 Reply Last reply Reply Quote 0
          • J
            johnpoz LAYER 8 Global Moderator
            last edited by Apr 14, 2015, 12:47 PM

            How exactly where you doing that on cisco?  Forwards of ports don't have auth on them..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • K
              KOM
              last edited by Apr 14, 2015, 1:08 PM

              Forwards of ports don't have auth on them..

              He was talking about the route being password-protected, not the port-forward.

              1 Reply Last reply Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator
                last edited by Apr 14, 2015, 3:38 PM Apr 14, 2015, 3:35 PM

                "I can not figure out is password protecting a route/forward."

                How do you password protect a route in cisco??  You can firewall what source IPs can use a forward, but if you want a password to access resource that would be done on the service providing box or proxy between them, etc.

                I know how you setup setup authentication to your neighbor routers so you sure your getting good routes.  But I have never heard of a user providing password to use a router or a forward.  So he says its easy to do on cisco, so curious what he was doing?  Was it some sort of captive portal?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • V
                  vladk
                  last edited by Apr 15, 2015, 2:35 PM

                  It has been a while since we decommissioned our cisco router so I don't remember.

                  All we had to do was specify that for a particular route (our iis server) you had to provide credentials to log in (credentials were specified right there on the router). Everyone coming from outside the network had to go through cisco first and then if they got credentials correctly they'd be allowed to get to the server.

                  It might have been captive portal, I don't remember at this point. I think the router was ASA5505 so there might be something in the docs.

                  1 Reply Last reply Reply Quote 0
                  • J
                    johnpoz LAYER 8 Global Moderator
                    last edited by Apr 18, 2015, 10:41 AM

                    sounds more like a ssl based vpn to me..  That yes the ASA support, this has nothing to do with routing or forwarding.  And no pfsense does not support that.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    1 out of 9
                    • First post
                      1/9
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                      This community forum collects and processes your personal information.
                      consent.not_received