It would still be in the same place, public or private, in the Firewall -> Rules -> IPsec tab
Their IP/network should be under source and yours should be under destination. I'm pretty sure that you would need to also have a rule on your internal LAN (or OPTn) interface allowing access from your local private host out to the remote public IP. I have always just allowed access from LAN to * on my LAN interface so it was probably covered by that rule. On Thu, May 9, 2013 at 12:53 AM, Mark Street <[email protected]>wrote: > Hi, > > I have successfully created an IPSEC tunnel with a Cisco ASA 5520 and my > pfSense 2.0.3 appliance. > > My side is a PRIVATE LAN network, their side is a PUBLIC network /27. > > I am able to connect successfully to one of their public IP's and specific > port through the tunnel. However they are having trouble connecting to one > of my internal hosts through the tunnel from their side. > > Since theirs is a public IP coming through the tunnel I am confused on > where to put the rule to allow traffic from their public network to pass to > a host on my internal LAN from the IPSEC tunnel. > > I have read the section in my pfSense Definitive Guide 13.3 IPSec and > firewall rules.. but I guess I need some clarity. > > Any hints/education would be appreciated. > > -- > Mark Street, D.C., RHCE > Chief Technology Officer > Alliance Medical Center > (707) 433-5494 > > _______________________________________________ > List mailing list > [email protected] > http://lists.pfsense.org/mailman/listinfo/list > >
_______________________________________________ List mailing list [email protected] http://lists.pfsense.org/mailman/listinfo/list
