On 2013-04-29 08:47, Jim Pingle wrote:
On 4/29/2013 8:36 AM, Bryant Zimmerman wrote:
I have several vlans on a pfsense deployment. VLAN 100 has one of our public DNS servers on it. I have a customer VLAN 2000 that needs to be able to relay through the DNS server. The customers vlan is routed out
one block of address and our vlan is on another.

The issue is we do not allow routing of private addresses between the
vlans so I need the customer vlan to be able to bounce out on it's
public address and back in on the public address of our DNS server. I can pin correctly but port 53 DNS traffic is not working. I am really stumped as to what is going on. If I open up a pinhole to the private
address it works but this against our security protocol.   Is there
somthing special I might need to add to the outbound NAT rules to get
this to work?

You need to allow then to reach each other on the private IPs. No matter what you do, there is no way around that requirement, short of actually
proxying the traffic with a daemon rather than NAT.

There is practically zero benefit to the method you're attempting
anyhow. Allow them to reach the private IPs of the target server and it will all work. You may need to enable NAT reflection (System > Advanced,
Firewall/NAT) but even then, the firewall rules apply *after* NAT, so
the target will always be the private IP of the server.

The only way to achieve the kind of isolation you're after would be to have both of those be on completely separate firewalls so the firewalls have no direct knowledge of the NAT involved on the destination. A lot
of trouble for a negligible security benefit.

As for the 'proxy' method, you could use the built-in load balancer
(relayd) to setup a balance "pool" of one server using a separate
virtual server for each external IP doing DNS pointing back to the
private server rather than doing NAT. relayd will actually proxy the
traffic, terminating the connection on the firewall so the above NAT
issues do not apply. However, you lose the source address of the DNS
client in the process, so it's not all sunshine and rainbows...

Just allow the traffic to the private IPs of the DNS servers and be done
with it.

Jim

One other possibility, which I'm using right now in a similar situation: use a VPN client on the PC whose end-point is in the remote non-routable network. It's a much bigger security hole (in real life) than allowing direct communication between the DNS server and the PC, but it might not be specifically contraindicated by your security policy, in which case you might be able to implement this.

-Adam Thompson
 [email protected]

_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to