It would still be in the same place, public or private, in the Firewall ->
Rules -> IPsec tab

Their IP/network should be under source and yours should be under
destination.  I'm pretty sure that you would need to also have a rule on
your internal LAN (or OPTn) interface allowing access from your local
private host out to the remote public IP.  I have always just allowed
access from LAN to * on my LAN interface so it was probably covered by that
rule.


On Thu, May 9, 2013 at 12:53 AM, Mark Street <[email protected]>wrote:

> Hi,
>
> I have successfully created an IPSEC tunnel with a Cisco ASA 5520 and my
> pfSense 2.0.3 appliance.
>
> My side is a PRIVATE LAN network, their side is a PUBLIC network /27.
>
> I am able to connect successfully to one of their public IP's and specific
> port through the tunnel.  However they are having trouble connecting to one
> of my internal hosts through the tunnel from their side.
>
> Since theirs is a public IP coming through the tunnel I am confused on
> where to put the rule to allow traffic from their public network to pass to
> a host on my internal LAN from the IPSEC tunnel.
>
> I have read the section in my pfSense Definitive Guide 13.3 IPSec and
> firewall rules.. but I guess I need some clarity.
>
> Any hints/education would be appreciated.
>
> --
> Mark Street, D.C., RHCE
> Chief Technology Officer
> Alliance Medical Center
> (707) 433-5494
>
> _______________________________________________
> List mailing list
> [email protected]
> http://lists.pfsense.org/mailman/listinfo/list
>
>
_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to