• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

General Setup Questions

Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
21 Posts 3 Posters 8.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A Offline
    AudiAddict
    last edited by Jul 2, 2008, 3:13 PM Jul 2, 2008, 3:10 PM

    @GruensFroeschli:

    There are 2 solutions to what you want:

    You create VIP's and 1:1 NAT each VIP to a server.
    Outbound traffic from the 1:1 NATed server will now appear as if from the VIP.
    The downside is you cannot use this VIP for something else.

    The second solution and in my opinion the better one is:
    You create normal NAT forwardings from the VIP's to your servers.
    After that enable advanced outbound NAT and you can specify which source should be NATed to what IP.
    Like this you can define that server x,y, and z should appear from VIP a and all the rest from VIP b

    I assume you didn't read my post before replying with this info :)

    To be safe, what I did now is the following :

    Create a virtual ip : 80.x.x.10   (WAN / Single address and Proxy Arp)

    Go to NAT and create a ordinary Port Forward from external address : (the virtual ip i created above) to the NAT/Internal IP.

    This works perfectly for two clients which are in the lab with the 3389 port (remote desktop).

    Is the above procedure ok? Or would you advise to use advanced NAT instead of auto? I assume advanced nat requires allot more maintanaince?

    Or is it more of a security risk to have auto nat on?

    1 Reply Last reply Reply Quote 0
    • G Offline
      GruensFroeschli
      last edited by Jul 2, 2008, 3:17 PM

      Yes i just wrote while you posted.

      What you did works.
      But like this traffic originating FROM the server will still appear as if from your main WAN.

      Advanced outbound NAT is not more or less secure than autogenerated NAT.
      It just gives you the possibility to create your own rules.

      We do what we must, because we can.

      Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

      1 Reply Last reply Reply Quote 0
      • S Offline
        Sh4
        last edited by Jul 2, 2008, 3:43 PM

        NAT has nothing to do with your network security because the NATed routes are firewalled anyway, only your rules matter. (could be a good catch phrase for pfsense)

        pfSense 1.2
        24x [DELL PowerEdge 1950 III]
        -2x Quad Core Intel Xeon E5420 2.5GHz
        -8GB FB 667MHz Memory (4x2GB) Memory RAID 2x4GB
        -PERC 6/i RAID Controller
        -Intel® PRO 1000PT Dual Port PCIe x4

        1 Reply Last reply Reply Quote 0
        • A Offline
          AudiAddict
          last edited by Jul 2, 2008, 3:46 PM

          @GruensFroeschli:

          Yes i just wrote while you posted.

          What you did works.
          But like this traffic originating FROM the server will still appear as if from your main WAN.

          Our current firewall solution does the same. I've not had any issue's with that really, but certain software did have to connect to our gateway/fw ip and not the specific server to communicate properly (our zabbix server monitoring package for example).

          Is it possible to have the server not appear to be communicating from it's wan but from it's own ip? just for several servers (like our mail?) i would assume it to be better to have our mail server not communicate to the outside with the gateway ip and not it's own.

          Would I have to turn on advanced NAT just for these two servers? Others don't really matter.

          1 Reply Last reply Reply Quote 0
          • S Offline
            Sh4
            last edited by Jul 2, 2008, 6:13 PM

            Im just guessing here as I never needed this before but I think you can achieve this by tweaking the outbound NAT and the corresponding rules. If not then another interface is the lazy way.

            pfSense 1.2
            24x [DELL PowerEdge 1950 III]
            -2x Quad Core Intel Xeon E5420 2.5GHz
            -8GB FB 667MHz Memory (4x2GB) Memory RAID 2x4GB
            -PERC 6/i RAID Controller
            -Intel® PRO 1000PT Dual Port PCIe x4

            1 Reply Last reply Reply Quote 0
            • A Offline
              AudiAddict
              last edited by Jul 4, 2008, 9:16 AM

              @AudiAddict:

              Also I'm missing the ability to set a LOCAL dns server and a external dns (I have them separate for security/maintanaince reasons).

              general setup gives me the option to add two. The option below that is only for dhcp wan, I have a static wan..

              Anybody know if this is possible? Set a different external dns server for the WAN when a static ip is selected?
              See the above quote..

              Obviously now I have to start slowly closing and locking down the firewall as much as possible.

              What's the best method? Block all rule? and above that create the allow rules for specific ports and protocols only?

              Anybody have any suggestions on the above question?

              1 Reply Last reply Reply Quote 0
              • G Offline
                GruensFroeschli
                last edited by Jul 4, 2008, 9:22 AM

                @AudiAddict:

                @AudiAddict:

                Also I'm missing the ability to set a LOCAL dns server and a external dns (I have them separate for security/maintanaince reasons).

                general setup gives me the option to add two. The option below that is only for dhcp wan, I have a static wan..

                Anybody know if this is possible? Set a different external dns server for the WAN when a static ip is selected?
                See the above quote..

                I dont really understand what you mean with setting a different dns server for the WAN when a static IP is selected.
                You mean you want to set the DNS server manually when you set a static IP on the WAN?

                The option on the general setup field is exactly that.
                Static DNS entries for a static WAN IP.

                The checkbox below only allows these static entries to be overridden IF your WAN is dynamic.

                Obviously now I have to start slowly closing and locking down the firewall as much as possible.

                What's the best method? Block all rule? and above that create the allow rules for specific ports and protocols only?

                Anybody have any suggestions on the above question?

                http://forum.pfsense.org/index.php/topic,7001.0.html
                Read the rules part

                We do what we must, because we can.

                Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                1 Reply Last reply Reply Quote 0
                • A Offline
                  AudiAddict
                  last edited by Jul 4, 2008, 3:49 PM Jul 4, 2008, 3:40 PM

                  Our other firewall allows me to configure a internal dns server for our domain/lan and a DNS server for the wan connection.

                  This way clients (internaly) can resolve hostnames and websites through the local dns server (active directory intergrated) and all other traffic outside is resolved and setup by our external dns server (not active directory intergrated).

                  If I set the internal dns server in those dns boxes, it wouldn't be able to resolve websites anymore would it? Or would it just use the root hints and settings from our internal server instead?

                  Would be better to have separate dns server sfor internaly and externaly, but not sure if this is possible with the pfsense

                  1 Reply Last reply Reply Quote 0
                  • S Offline
                    Sh4
                    last edited by Jul 4, 2008, 6:13 PM

                    Just set the DNS in your DHCP settings as usual, you never set the internal DNS on a gateway for your local clients but on the client themselves.

                    pfSense 1.2
                    24x [DELL PowerEdge 1950 III]
                    -2x Quad Core Intel Xeon E5420 2.5GHz
                    -8GB FB 667MHz Memory (4x2GB) Memory RAID 2x4GB
                    -PERC 6/i RAID Controller
                    -Intel® PRO 1000PT Dual Port PCIe x4

                    1 Reply Last reply Reply Quote 0
                    • A Offline
                      AudiAddict
                      last edited by Jul 4, 2008, 6:36 PM

                      Good point. What do you suggest to use the internal dns server or the wan dns server from the isp (even though it's static)

                      Obviously the dns servers from the wan don't allow me to edit stuff so it would be better to use the internal dns here I suppose?

                      1 Reply Last reply Reply Quote 0
                      • G Offline
                        GruensFroeschli
                        last edited by Jul 5, 2008, 10:16 AM

                        If you configure your clients to use pfSense as DNS, you can configure the DNS forwarder accordingly.
                        I assume you have a domain for your network.

                        On the DNS forwarder-config page is the part:

                        Below you can override an entire domain by specifying an authoritative dns server to be queried for that domain.

                        So you could set your internal DNS for your own domain.

                        We do what we must, because we can.

                        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                        1 Reply Last reply Reply Quote 0
                        21 out of 21
                        • First post
                          21/21
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received