I'm planning to set up a new firewall/router at our company, and am
leaning towards using pfSense because I want several green networks
(either using multiple ports on the firewall machine, or using a managed
switch and VLANs - as far as I understand it, they can work the same way).
There are going to be a couple of server machines on different branches
of the LANs, but I need access to them from the other branches. The
setup I've planned looks like this:
/-----------\
| |-red1----internet
| pfSense |-red2----(second internet connection, optional)
| |
| |-orange--DMZ---web server, mail server, squid, etc.
| |
| |-blue---(wireless for laptops, including visitors)
| | | | |
| | LinkSys WRT54GL LinkSys LinkSys
| | / \ / \ / \
| | laptops, etc.
| |
| |-green1---LAN (192.168.1.x)---server1.1, pc1.1, pc1.2, etc.
| |
| |-green2---LAN (192.168.2.x)---server2.1, pc2.1, pc2.2, etc.
| |
| |-green3---LAN (192.168.3.x)---server3.1, pc3.1, pc3.2, etc.
| |
\-----------/
Making appropriate firewall and routing rules for access to the DMZ
servers from the green LANs is easy enough, as are things like allowing
ssh access on different LANs for administrative purposes. But it is
also important that I can get windows share access in some way across
the LANs. For example, pc1.2 (say, 192.168.1.102) should be able to
mount a share on server2.1 (192.168.2.1), while the reverse is not true
(i.e., no machine on LAN2 should see the pc's on LAN1). Is it
sufficient, and safe, to simply open a pinhole for traffic on port 139
towards 192.168.2.1 from 192.168.1.x ? I suppose I could set up VPNs
somewhere to tunnel traffic around, but I can't see that this would
actually improve matters (I have no need to encrypt traffic passing
between greens) - I would need similar rules to limit the VPN traffic.
In fact, I'm assuming that once I've got things figured for cross-green
routing, I can use the same sorts of rules for VPN's from laptops on the
blue zone or attaching via the internet.
As far as I can tell, it is only the share access that I need from the
SMB/CIFS protocols. pfSense's DNS server should be able to handle
naming, and I am not running a windows domain (it's all set up as a
workgroup).
If I can't get a stable and secure arrangement for SMB sharing, what are
my other options? At the moment, we have a couple of linux file servers
and one old windows one, which can be replaced if it is not flexible
enough. I've heard of using WebDAV as a protocol - W2K and XP (and
linux, and presumably FreeBSD :-) can mount WebDAV paths, and use them
directly. If the WebDAV access is over https, then it could be used
directly from outside the LANs without needing a VPN. Another idea I
have read about is using a SFTP server along with WebDrive software.
Any hints, tips, website pointers, or comments about how only an idiot
would arrange things like that, would be much appreciated.
mvh.,
David