Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 367
  • Last Modified:

WAN and LAN NIC on Windows Server 2012

I have a web portal that is both internet facing and LAN facing..  I have the WAN NIC with a public IP and gateway.  The LAN NIC only had an internal IP and no gateway.  This worked just fine, however, we setup a site to site tunnel to our office..  We also use our internal domain DNS which resolved the internal IP of the web portal..  The site to site tunnel will required the LAN NIC to have the local gateway to be able to route between the two subnets in the site to site tunnel.  Due to this I added the internal gateway to the LAN NIC.  Everything is working, however, as I understand this is not best practice..  So..  Should I change the internal DNS records to resolve the public IP so the site to site users hit the public IP or should I setup static routes on the Windows server?  I kind of like how the site to site users can access the web portal through the tunnel for that's more secure for those sessions..
0
gopher_49
Asked:
gopher_49
2 Solutions
 
kevinhsiehCommented:
I probably would not have two NICs on the server. It's way more complicated than just doing a static NAT or port forwarding to the server from your firewall or public facing router.

That said, unless you want to change your design and go single NIC, you should remove the default gateway from your LAN interface, and add static routes for and network that is inside.
0
 
Aaron TomoskyTechnology ConsultantCommented:
Agreed, only one gateway.
Also agreed this should be a single NIC server with a firewall/router doing the public forwarding.
0
 
gopher_49Author Commented:
The thing is.  I have domain resources that the server needs to access on the LAN.  And...  I want my SIP services to not deal with NATs.  That's why I have the public NIC
0
Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

 
masnrockCommented:
Why not create a DMZ? Sure, you still have a NAT situation, but it would eliminate some issues, plus improve security.
0
 
gopher_49Author Commented:
I have never gotten pfsense's NAT to work well with SIP...  I have to use the sipproxd module and that doesn't meet my requirements..  I guess with that said I need to stick with my current config and move to a Fortinet virtual appliance versus the pfsense..
1
 
masnrockCommented:
Ahh. Sometimes it comes down to settings like SIP ALG or transformations that will cause the nightmares. Each firewall has its down way to overcome quirks like that. For example, Sonicwall has a particular patch for firmware, but you have to explicitly request it from their support, and it takes several weeks to receive it because their engineers have to work on the code.

This link may help a bit for trying to get things working with pfsense:
https://www.reddit.com/r/PFSENSE/comments/31a1y1/sip_problems_behind_pfsense_box/

But I think this 3CX guide might be even more helpful if you're trying to stick with pfsense:
http://www.3cx.com/blog/voip-howto/pfsense-firewall/
0
 
gopher_49Author Commented:
I've tried everything with pfsense.. In this environment I had constant issues getting SIP to work...  Will my current config work until I get a different firewall?  So far I haven't noticed any issues..
0
 
masnrockCommented:
For security's sake, I'd tell you to replace the firewall if there's no way to make pfsense work. As long as it's directly connected to the network AND the internet, that server is serving as a potential gateway to hacking the network.

What type of phone system is it anyway?
0
 
gopher_49Author Commented:
I have the Windows Firewall on..  The datacenter DDoS attacks and has some IPS/IDS.  It's a unified communcations platform.  The SIP stack I Asterisk I think..  But there is a lot going on there.  I guess I'll look at getting a different virtual firewall.
0
 
gopher_49Author Commented:
pfsense can be a pain in complex SIP environments...Due to this I'll just move to Fortinet's virtual firewall where I get vendor support.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now