I'd like to configure my pfSense box with 5 NICS

1- WAN1 - x.x.x.169
2- LAN - 192.168.15.1/24 - internal secure network
3- PUBLIC - 192.168.1.1/24 - public wireless network
4- WAN2 - transparent
5- DMZ - transparent - webserver

I have been assigned two blocks of IP's on two separate incoming connections:
x.x.x.168/29
x.x.x.168 is my network address
x.x.x.174 is my DSL router/gateway
x.x.x.175 is my broadcast address

x.x.x.176/29
x.x.x.176 is my network address
x.x.x.182 is my DSL router/gateway
x.x.x.183 is my broadcast address

I want to do the following.

I want the LAN and PUBLIC networks to be completely severed by firewall from each other. I want the both to have access to the internet through NAT on WAN1.

I want connections on PPTP-VPN (gre, tcp1723)to be forwarded from WAN1 to LAN:192.168.15.216. I want also to be able to connect to that VPN using the WAN1 IP address from PUBLIC.

I want WAN2 and DMZ to be bridged and transparently firewalled. I'm going to host a webserver on x.x.x.177. I want LAN and PUBLIC to be able to access that webserver.

At some point, though not necessary to begin with I would like to enable traffic shaping on LAN and PUBLIC to give priority to LAN traffic going out WAN, and then other general shaping rules.

Is this feasible and doable configuration with pfSense? Am I making it too complicated by trying to use one box to handle the NAT for one connection, and the firewall for the other?

Any insight, guide, suggestions, would be appreciated.

Thanks
Josh Galvez


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to