Automatic outbound NAT rules look like they are taking care of all that. The issue I have is that it doesn't seem optimal to have Internet access require "allow all". Too much margin for error in setting things up.
On Wed, Jun 28, 2017 at 12:22 PM, Dimitri Alexandris <d.alexand...@gmail.com > wrote: > Except for the allow filter (DMZ to WAN, allow everything), you must also > NAT to WAN, assuming that DMZ subnets have private IPs. > > That should be done on each DMZ. LAN rules/NAT comes as default, so you > can "copy" them just changing output interface of the copy, and they will > be auto-moved to the proper tabs. > > > On Mon, Jun 26, 2017 at 4:32 PM, Jeppe Øland <jol...@gmail.com> wrote: > > > The thing is I couldn't figure out what rules are needed to get out to > the > > Internet! > > > > If I add no rules at all, then the PC can get a DHCP address, but it > can't > > even ping pfSense. > > > > I tried adding several rules (simultaneously), but didn't find anything > to > > allow me out to the Internet. > > > > Simply adding a "DMZnet -> WANnet" rule did not let me get out. > > Adding the firewall specifically (since that is the GW it will go > through) > > did not help either. > > (I tried a few more things in desperation, but nothing changed) > > > > Obviously the "DMZnet -> !LANnet" worked, but that doesn't block off all > > the other DMZs :-( > > > > Regards, > > -Jeppe > > > > > > On Sun, Jun 25, 2017 at 8:28 PM, Leandro de la Paz <lean...@jovenclub.cu > > > > wrote: > > > > > Hi, it should be simple. pfsense deny all the traffic in the absence of > > > any rules so it should be blocking all communication between DMZs by > > > default. To allow the traffic to reach Internet, all you need to do is > > > create a rule that permit the traffic that goes everywhere except to an > > > alias that contains the private network (RFC1918) subnets. I recommend > it > > > that you do it at the floating rules tab, that way you may select > several > > > interfaces in one rule. However, you still may need to edit the rule > > every > > > time that new DMZ is added. > > > > > > --- > > > Regards, > > > Leandro > > > > > > En 25 jun. 2017 4:04 p. m., en 4:04 p. m., "Jeppe Øland" < > > jol...@gmail.com> > > > escribió: > > > >Does anybody know how to do this more easily. > > > > > > > >Lets say I have 10 different isolated DMZs. > > > >(They are created as VLANs on the "inside" interface so I can connect > > > >servers to them). > > > > > > > >Now I want each VLAN to be able to get an IP address from a DHCP pool, > > > >and > > > >to hit the Internet. > > > >Nothing else. > > > >No DMZ<->DMZ or DMZ->LAN traffic. > > > > > > > >The default LAN rules allow me to hit each DMZ from the LAN, so that > > > >part > > > >is good. > > > >The problem is getting each DMZ isolated from each other. > > > > > > > >The only thing I have working is to create 10 rules on each DMZ (to > > > >block > > > >access to the other DMZs and the LAN), and an accept "any" rule to be > > > >able > > > >to get out. > > > > > > > >I really don't like this as it's error prone. > > > >If I add a new DMZ, I have to remember to add that rule to all the > > > >others. > > > > > > > >Is there an easy set of rules I can make to allow the DMZ access to > > > >only > > > >its own net, and the Internet? > > > > > > > >Regards, > > > >-Jeppe > > > >_______________________________________________ > > > >pfSense mailing list > > > >https://lists.pfsense.org/mailman/listinfo/list > > > >Support the project with Gold! https://pfsense.org/gold > > > _______________________________________________ > > > pfSense mailing list > > > https://lists.pfsense.org/mailman/listinfo/list > > > Support the project with Gold! https://pfsense.org/gold > > > > > _______________________________________________ > > pfSense mailing list > > https://lists.pfsense.org/mailman/listinfo/list > > Support the project with Gold! https://pfsense.org/gold > > > _______________________________________________ > pfSense mailing list > https://lists.pfsense.org/mailman/listinfo/list > Support the project with Gold! https://pfsense.org/gold > _______________________________________________ pfSense mailing list https://lists.pfsense.org/mailman/listinfo/list Support the project with Gold! https://pfsense.org/gold