Then don't use pfSense - that's simple.
Like I said in a previous email, feel free to do this with your choice of OS.
PfSense doesn't give you quite enough rope to do what you want.
-Adam

On August 16, 2014 11:09:20 PM CDT, Bob Gustafson <[email protected]> wrote:
>I don't need the firewall features of pfsense in my application. The 
>firewall is 'upstream' of the pfsense box - in the ISP furnished 
>modem/router.
>
>Please re-think your suggestions - with the pfsense firewall function 
>out of the picture.
>
>Bob G
>
>On 08/16/2014 03:37 PM, Espen Johansen wrote:
>>
>> Nat traversal is trivial. Firewalling needs physical interfaces.
>Vlans 
>> are possible but vlan jumping is also possible. Vlans to do different
>
>> zones (lan/wan lan/dmz dmz/wan) is not something I recommend as vlan 
>> jumping can be done in most environments. In short. Forget an idea 
>> where you firewall with a single interface. Even if this is only to 
>> play with at home. Just dont. A vanilla linux/bsd will let you shoot 
>> yourself in the foot. So you can do it there. But there are no 
>> firewalls that will allow this with out 2 interfaces. Most require 2 
>> physical, but some will allow for 2 or more vlans. Again, do not do
>it.
>>
>> 16. aug. 2014 22:13 skrev "Adam Thompson" <[email protected] 
>> <mailto:[email protected]>> følgende:
>>
>>     On 14-08-16 01:13 PM, Espen Johansen wrote:
>>>
>>>     You would have to do a major code rewrite to get this done.  And
>>>     it would be insecure and it would make no pf sense :-) this is
>>>     network basics. You dont seem to understand some network
>>>     fundamentals. Sorry but this is not doable without using vlans
>or
>>>     2 physical interfaces.
>>>
>>>     16. aug. 2014 20:06 skrev "Bob Gustafson" <[email protected]
>>>     <mailto:[email protected]>> følgende:
>>>
>>>         I'm interested in doing it all within the Alix using
>pfsense.
>>>         A minimum hardware approach.
>>>
>>>         Think of my WAN mentioned below as the LAN network created
>by
>>>         the modem/router furnished by the ISP and the LAN mentioned
>>>         below as devices also connected to the back end of the
>>>         modem/router, but not accessible by the modem/router. Only
>by
>>>         LAN/pfsense.
>>>
>>>         Bob G
>>>>
>>>>             I would like to pass WAN packets (192.168.1.0/24
>>>>             <http://192.168.1.0/24>) and LAN packets
>(192.168.2.0/24
>>>>             <http://192.168.2.0/24>) through the same connector.
>>>>
>>>>             pfsense would provide the NAT and firewalling within
>the
>>>>             box.
>>>>
>>
>>     To clarify Espen's comments : yes, it is possible to run two
>>     subnets on the same wire.
>>     Any _router_ can route between two subnets on the same wire (or
>>     the same VLAN, same thing - technically the same "broadcast
>domain").
>>     A _firewall_, however, will refuse to do so because it's
>>     nonsensical from a security perspective.
>>     So pfSense is a router, yes, but it is also a firewall, and in
>>     areas where those two roles conflict, the firewall role wins.
>>     As previously pointed out, you can't usefully use pf(4) in the
>>     circumstance you describe.
>>     It is technically possible, on some platforms, to perform NAT
>>     between the two subnets.  It would be possible, AFAIK, to
>manually
>>     craft a pf rule that does this; it is not possible to get the
>>     pfSense GUI to generate that rule. That's where the "major code
>>     rewrite" comes into play.
>>
>>     I'm not aware of any firewall GUI that will let you do this - and
>>     for a good reason!  By hooking your LAN up directly to the WAN,
>>     you're effectively eliminating 99% of the security a firewall
>>     gives you.  (And, yes, it is possible to directly attack private
>>     IP addresses on most ISPs.)
>>
>>     If you're determined to deploy this model, you'll have to run a
>>     bare OS that can route, i.e. Linux, OpenBSD, FreeBSD, etc. and
>>     configure the networking stack and NAT rules by hand.
>>
>>     -- 
>>     -Adam Thompson
>>       [email protected]  <mailto:[email protected]>
>>
>>
>>     _______________________________________________
>>     List mailing list
>>     [email protected] <mailto:[email protected]>
>>     https://lists.pfsense.org/mailman/listinfo/list
>>
>>
>>
>> _______________________________________________
>> List mailing list
>> [email protected]
>> https://lists.pfsense.org/mailman/listinfo/list
>
>
>
>------------------------------------------------------------------------
>
>_______________________________________________
>List mailing list
>[email protected]
>https://lists.pfsense.org/mailman/listinfo/list

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
_______________________________________________
List mailing list
[email protected]
https://lists.pfsense.org/mailman/listinfo/list

Reply via email to