Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allow external domain join through pfsense

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 4 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      alxbob
      last edited by

      Hi i am trying to connect external user to  active directory and domain controller through pfsense.

      I found the one way domain override and  to allow ports and restrict rpc range.

      Is there another option like cisco DCERPC helper for pfsense to dynamically allow rpc ports?

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        Perhaps try a VPN instead of digging gapping security holes into your network?!  :o

        1 Reply Last reply Reply Quote 0
        • A
          alxbob
          last edited by

          @doktornotor:

          Perhaps try a VPN instead of digging gapping security holes into your network?!  :o

          Yes i know that answer was coming … i know the risks but i wanna do that this way

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            Yeah. Good luck. There's no "helper" for this. Thanks god.

            1 Reply Last reply Reply Quote 0
            • A
              alxbob
              last edited by

              @doktornotor:

              Yeah. Good luck. There's no "helper" for this. Thanks god.

              So pity…

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                i know the risks but i wanna do that this way

                But why??  OpenVPN is easy to configure for the admin, easy to install & run for the user and very secure.

                1 Reply Last reply Reply Quote 0
                • A
                  alxbob
                  last edited by

                  @KOM:

                  i know the risks but i wanna do that this way

                  But why??  OpenVPN is easy to configure for the admin, easy to install & run for the user and very secure.

                  Yes but the pcs that will join the domain externally are in 90 different locations!

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    Well, seriously - exposing RPC and similar crap on internet is totally insane. And setting up ~100 locations in some alias will take more time than distributing preconfigured OpenVPN package to click-click-install-connect-join-uninstall.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      "i know the risks but i wanna do that this way"

                      That is just plain stupid!!  It would be one thing if you just didn't understand the risks and thought you could do it this way - but understanding the risks and still wanting to do it is just plain MORONIC!!

                      If you have remote users that need to interact with your AD, then have them vpn in..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • A
                        alxbob
                        last edited by

                        Thanks all for you time i was just asking if it was something similar to this http://clintboessen.blogspot.gr/2011/06/allowing-domain-membership-through.html as an option

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          There is a HUGE difference between creating pinholes that allow access from a firewalledsegment into your AD from your own network vs doing such a thing from the public internet..

                          Normally if you have boxes in your dmz that need access to your AD you put a read only DC in your dmz vs opening up your dmz into your normal network.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • KOMK
                            KOM
                            last edited by

                            A good analogy might be that the locks you have on your bathroom door in your house are not suitable for your front door.  The protections you have between internal LAN segments is potentially not strong enough to protect you from the public Internet.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.