Hey All,
I've got a bit of a head scratcher. I've got the following setup running:
Interfaces:
Internal network: 192.168.0.0/255.255.255.0
DMZ: X.X.X.0/255.255.255.248 (Effectively .1-.5; .6 is GW)
ASG: 192.168.0.254 Internal / X.X.X.5 DMZ
Additional Interfaces on ASG: X.X.X.2, X.X.X.3, X.X.X.4/255.255.255.248
NAT/MASQ Rules:
Allow all out: Masquerade from internal network to DMZ address
HTTP to XXX: Any -> DMZ Address / HTTP
HTTPS to XXX: Any -> DMZ Address / HTTPS
Packet filter Rules:
Internal Network (ANY) -> Any: Allow
Any (HTTP) -> Internal web server: Allow
Any (HTTPS) -> Internal web server: Allow
Long story short, I am unable to access the web sites on .2-.4 from the internal network. Similarly, I cannot access the webadmin of ASG (via .5) from the internal network either. Shouldn't the allow any out masquerade rule and packet filter rule allow access from the internal network to an external address of the ASG? If not, what else do I need for this to work? I don't want to have to run DSL internally just to access these site...
Thanks,
John
This thread was automatically locked due to age.