arp caching can produce problems like this. solution is to reboot the
switches, the firewall and everything else connected to them. I have
wasted whole days debugging problems like this

sai


On Tue, Sep 9, 2008 at 3:34 PM, Glenn Kelley <[EMAIL PROTECTED]> wrote:
> well still no go - have tried all the suggestions sent in group and off.
> Weirdest thing i have ever experienced.
>
> The system now has a total of 5 NICS - and still no go
> Anyone willing to help me out for a few dollars?
>
> I have both a remote kvm as well as external network access to the system
> should we need it.
>
> please let me know off list.
> I need to get this going asap.
>
> Thanks
>
>
>
>
> On Sep 9, 2008, at 11:15 AM, Glenn Kelley wrote:
>
>> Guess aht would help
>>
>> For now we have no firewalling happening
>>
>> LAN/WAN set to pass all traffic.
>> figured thats easiest to see if it passes traffic first.
>>
>> still nothing :-(
>>
>>
>> On Sep 9, 2008, at 10:43 AM, Christopher Iarocci wrote:
>>
>>> Glenn,
>>>
>>> A few questions come to mind off the top of my head.
>>>
>>> Did you enable filtering bridge in the System-->Advanced section?
>>>
>>> If so, did you put rules in place to pass the traffic you want?
>>>
>>> You didn't tell us anything about the config of your PFSense box, other
>>> than
>>> it's a bridge, so it's hard to really tell what's wrong.
>>>
>>> Christopher Iarocci
>>> Network Solutions Manager
>>> Twin Forks Office Products
>>> 631-727-3354
>>>
>>>
>>> -----Original Message-----
>>> From: Glenn Kelley [mailto:[EMAIL PROTECTED]
>>> Sent: Tuesday, September 09, 2008 10:06 AM
>>> To: [email protected]
>>> Subject: [pfSense Support] Transparent Firewall
>>>
>>> Greetings folks -
>>> After a really nice long google search I ended up here ...
>>>
>>> In short we have a number of ip's a client of ours is looking to setup
>>> PFSense as a transparent bridge/firewall for.
>>>
>>> Setup is as follows
>>>
>>>
>>>                Incoming Ethernet Connection from Data Center
>>>                                                        |
>>>                                                        |
>>>                                                        |
>>>                                                SWITCH
>>>                                                        |
>>>                                                        |
>>>                                                        |
>>>                                        PF SENSE WAN  (IP 216.119.x.x)
>>>
>>> ~
>>>
>>>
>>> ............................................................................
>>> ....................... external
>>> ip for management 24.182.x.x
>>>                                                        ~
>>>                                                        ~~~~~~~~~~~~
>>> PFSense
>>> LAN ( IP 216.119.x.x)
>>>
>>> |
>>>
>>> |
>>>
>>> |
>>>
>>> SWITCH
>>>
>>> ~
>>>
>>> ~
>>>                                                Their Systems  ~~~~~~~~~~
>>>
>>>                                                running ip ranges
>>>                                                216.119.x.x
>>>                                                67.184.x.x
>>>                                                65.194.x.x
>>>
>>> so here is the deal - we allowed all traffic from WAN / LAN
>>> bridged LAN to WAN
>>>
>>> Internally / externally we can ping the ip ranges .... when the
>>> incoming ethernet is into the last switch touching their internal
>>> network - but when we move that to the WAN Switch - no luck.
>>> We know the connections are good - switch is good -
>>>
>>> Any suggestions?
>>>
>>> I would be willing to pay a small bounty - (as this non-profit
>>> customer is willing (a church entity ) ) if someone could help.
>>>
>>>
>>> Thanks a ton in advance
>>> After 3 days of scratching our heads - redoing this 1400 times (ok so
>>> maybe not that much)
>>> but enough to know the steps in our heads ... we thought it might be
>>> time to ask.
>>>
>>> If this works - I can see a great value to this PFSense product ...
>>> Really nice looking - and it actually can compare very well to the
>>> SonicWall, WatchGuard and other Pix products we see here...
>>> Gotta love Open Source...  Let's hope this works out.
>>>
>>> Thank again
>>>
>>> Glenn
>>>
>>>
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>
>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>> For additional commands, e-mail: [EMAIL PROTECTED]
>>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to