On 5/29/2013 4:05 PM, Adam Thompson wrote:
On 2013-05-29 14:16, [email protected] wrote:
Hello all,
Well I asked this question a few days back under a sanity check
subject and it turned into more of a discussion on running pfSense in
a virtual environment so I am rephrasing the original question.
Running pfSense 2.0.3 on dedicated Hardware and I am working with my
current ISP to build a scenario like the following:
ISP ->pfSense WAN interface(redundant with CARP) listening on
65.251.xxx.xxx/29 -> LAN interface 69.169.xxx.xxx/27
The ISP will use one of the /29 host IPs for their router and
obviously I will need one IP for each of the WAN interfaces on the two
pfSense boxes and one for the first CARP ip.
That leaves me 2 "spare" addresses to use later. I am planning to
use th ese down the road as a network segmentation scheme.
So, the ISP will configure their routers to direct all
69.169.xxx.xxx/27 traffic to my WAN interface at 65.251.xxx.xxx/29.
Here's the rub. If they have a *route* to 69.169.x.x/27 with a
next-hop gateway of 65.251.a.b (your CARP IP, the subnet mask is
irrelevant here), then this will work without forwarding at all - this
is simply called "routing" and it happens magically once everything is
set up - subject to firewall rules, that is.
I am "assuming" that from there I can simply port forward to the
69.169.xxx.xxx/27 addresses same as if they were private
192.168.0.0/24 addresses but with out NAT but, thisis where I am
unsure. Do I set the forwarding rules destination as the
69.169.xxx.xxx/27 address even though this is on the LAN interface?
How to i tel the WAN interface that it is supposed to be listening for
the 69.169.xxx.xxx/27 addresses?
No. If you're routing, you are not port-forwarding. If you are
port-forwarding from public IPs to (internal, unreachable) public IPs,
you need to be shot - even a /27 is a valuable resource at this time.
Also, port-forwarding REQUIRES NAT. It's inherent in the very nature
of what port-forwarding is.
Am I missing anything that is gong to make this plan unfeasible?
Unfortunately, a good grasp of IP routing. You obviously understand
NAT, which is a (very!) special case of IP routing. However, you are
moving beyond the corner-case of NAT and you will learn that
In fact, your email could be used as an argument for "NAT is harmful
to the internet" in various fora I've seen... oh, well, those horses
are long gone and that barn door not only is still hanging wide open,
it's been torched, stolen, dismantled and vaporized.
There is a good reason for doing this involving services (such as
sip) that do not play well with NAT and the fact that due to
architecture some virtual servers may be behind NAT within the
internal environment which would mean NAT'ing a NAT'ed address, never
a good thing.
Double-NATing actually works surprisingly well for most applications.
SIP can be NAT'd quite successfully nowadays. I hope you aren't
planning on making SIP phones connect directly to the internet?
Nonetheless, avoiding NAT is always a good thing (IMHO).
You've got about 90% of the picture correct, but at this point you
need to stop and figure out how to make this work with a router, not a
firewall. Once you understand the router-only model, add the firewall
notion back into the picture.
A firewall with NAT turned off and
Allow-All-From-Any-To-Any-In-All-Directions rules is, essentially,
just a router. Every firewall must be a router, inherently[1], so you
don't need to go buy a router to do this: pfSense can do it quite
nicely. In fact, on the System-->Advanced-->Firewall/NAT page, you'll
find a checkbox "Disable all packet filtering" that does exactly this.
I strongly recommend you turn on that checkbox (at least in concept),
and completely ignore the Firewall section of the GUI until you have
everything figured out. This might be dangerous in reality, since
that leaves you without a firewall... but I think you'll need to set
up a lab system anyway to figure out how this will work.
I apologize, I don't know how to explain routing in one email (but I'd
be happy to come teach a one-day seminar on it); it will actually be
more difficult to understand routing because you *do* have experience
with NAT... you will have to un-learn NAT before figuring out routing.
-Adam
[1]Application proxy firewalls, e.g. Gauntlet, are a different story.
Adam,
Thank You for the kick in the pants, it is needed from time to time. If
I could afford you for the day I would be saying pack your bags but what
I can afford to pay would be insulting. I kind of understand, but do
not claim expertise in, basic routing. Just haven't done anything with
it for about a decade. Passed the CCNA about 13 years ago, not that
that really means anything, just un-wounding my pride a little<G>.
I am hoping to do the routing and firewalling with the same pfSense
boxes due to budget constraints. A pair of (insert favorite brand
here) routers with failover would definitely be out of budget for this
project, at least for now.
If I I simply add rules on the WAN interface tab to allow traffic to the
/27 addresses will this work? This way I do not have to turn on the
"Disable all packet filtering" check box as that would defeate the
purpose. I suppose I could turn it on temporarily for testing then turn
it off and add the rules?
Will I need to tell the /27 LAN interface LAN that the /29 WAN interface
is its default gateway or will it know that from being directly connected?
I will be setting this up in a semi lab environment, but want to get as
much real information as I can before I start to swear at things due to
my miss-configurations.
And no I will not be putting sip phones directly on public addresses
just a few, hopefully well firewalled, Asterisk boxes in an virtual
environment along with many other services on many other virtual servers.
Thanks again,
JohnM
_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list