or you could have the PFS as the only thing plugged into the Cisco, and it's second interface connected to a switch for the BYOD. Then all traffic would travers the PF
I mis understood you. Can we move the BYOD stuff to the other post please as this thread is about the main firewall. thanks
that will route all trafic going to the 172.20.2.0 via the PF
pfsense is rubbish with PPTP traffic so if anyone uses that then avoid it.
There are others like ClearOS Community Edition | Software
Router/Bridge Linux Firewall
Untangle: Network Policy at Work
are also good choices that can handle protocols a bit better and include stuff like WAN load sharing.
Its only a test really i think we are going for smoothwall in the end of it.
Well I am 70% of the way there.
I haev PF up, captive working , just need to fix it's DNS as that's being funky... and then make sure the rest of it is LOCKED down.
I wasted 2 hrs because explorer would not show the toolbar at the top and I could not manage PF via the WAN interface. Firefox on a client side allowed me to enable HTTPS to get in via firefox on the wan side.
Im glad PFSense is serving you guys well! and hope you enjoy it as much as I have......
My test laptop can get an IP, it gets DNS.
I fire up firefox and try to go to google.
It goes to the captive portal and I log on ( will change this to an accept button )
And it goes directly to the citrix logon.
I try to go to google, it does nothing.
I try to ssh to our web server, it does nothing.
I try any website other than the VDI.... It does nothing..
cpjitservices (15th November 2012)
There are currently 1 users browsing this thread. (0 members and 1 guests)