The big problem that I see people have that that want to do networking
based on hostnames rather than IP addresses. Such as how named virtual
hosting works on Apache. But the problem is that the hostname is translated
to an IP address on the client side and the only thing the server sees is
the IP address that the client used to connect. Apache knows what hostname
was used because the browser sets a HTTP header that has the hostname. This
was an after the fact addition to the HTTP standard to allow for lots of
websites on one IP address. A few years ago TLS was extended to allow for
the same thing to happen w.r.t. HTTPS web sites. To allow this this on
other internet protocols will require that both the clients and server both
be upgraded to pass the hostname as a parameter (worse, not all protocols
were designed to allow for this to be done in a backwards compatible
fashion), which is now much more of a issue with a billion users than it
was in the mid 90's with only a few million users.

I'd love it if there was simple solution, but I don't see one that would
compatible with today's internet. Much of the original design of the
internet was for a 1 to 1 mapping of IP addresses, rather than a 1 to many
mapping (which is why there is usually a lack of a disambiguation field in
the protocol).


Walter




On Fri, Mar 28, 2014 at 7:54 AM, greg whynott <greg.whyn...@gmail.com>wrote:

> thanks for all the suggestions folks!   While very nitchy and sure not to
> be a wildly popular function,  it would be nice to see,
> "policy-routing/nating" based on matching an ACL which can make decisions
> based on data from the higher layers.
>
> his set up is one comprised solely of virtual hosts and networks
> (excluding the router/firewall which run on its own hardware) under an ESX
> environment.  They have about 12 customers and each has VMs and their own
> L2 network and hosts.
>
> For now it looks as if the jump host will be the best go.   Have one set
> up where all the clients connect to and based upon who they log in as, will
> determined what they see/have access to.
>
> The VPN idea is a good one but they would rather not add more gears to the
> machine which may generate support issues.
>
>
> thanks again and have a great weekend,
> greg
>
>
>
>
> On Thu, Mar 27, 2014 at 6:37 PM, Jonathan Bainbridge <jbainbri...@avmi.org
> > wrote:
>
>> Remote Desktop Gateway, built into Windows 2008 and 2012. Put it behind
>> the pfSense, port forward the rdp port to the RDG. It authenticates the
>> user and the user can connect to any internal machine.
>> In the Remote Desktop Connection you can enter the information for the
>> RDG. Protect using an SSL on the RDG.
>> Bonus, you can also setup Remote Desktop Web Services so you can have
>> programs on Terminal Services available... Note, that part DOES require IE.
>> On Mar 27, 2014 2:37 PM, "greg whynott" <greg.whyn...@gmail.com> wrote:
>>
>>> Hello,
>>>
>>> I'm not very familiar with TMG from Microsoft but a client I am helping
>>> migrate to pfsense from TMG has asked me if they'll be able to use the RDP
>>> port forward in the same way as TMG handles it.
>>>
>>>
>>> Apparently there is a function within TMG which acts similar to named
>>> based virtual web hosts,  where it parses the DNS name from the request and
>>> makes a forwarding decision based on that bit of information.
>>>
>>> For example,  the firewall only has 1 public IP facing the internet.
>>>
>>> if you RDP to:     you'll land on the internal server:
>>>
>>> host1.foo.com      10.101.1.2
>>> host2.foo.com      10.101.3.4
>>> host3.foo.com      10.101.1.8
>>>
>>>
>>> host1,2 and 3 all resolve to the same public IP.  And we are not
>>> specifying ports.
>>>
>>> That is the behaviour he is hoping to achieve,  where he can RDP to
>>> various internal machines without referencing ports.
>>>
>>>
>>> Sound do-able?    If pfsense can not do this,  are you aware of anything
>>> out there that can aside from TMG?
>>>
>>> -g
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> List mailing list
>>> List@lists.pfsense.org
>>> https://lists.pfsense.org/mailman/listinfo/list
>>>
>>
>> _______________________________________________
>> List mailing list
>> List@lists.pfsense.org
>> https://lists.pfsense.org/mailman/listinfo/list
>>
>
>
> _______________________________________________
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list
>



-- 
The greatest dangers to liberty lurk in insidious encroachment by men of
zeal, well-meaning but without understanding.   -- Justice Louis D. Brandeis
_______________________________________________
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Reply via email to