Pfsense Jobs

6 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Intermediate ($$) - Est. Budget: $50 - Posted
Hello, We are having difficulties narrowing down the problem we're having with some of the IP addresses configured on our pfsense firewall (pfSense 2.2.3-RELEASE). The following actions were taken: - Added a Virtual IP as IP Alias for each IP address (example: X.Y.Z.245/28) - Added a 1:1 NAT mapping rule on the WAN interface (example: External subnet IP X.Y.Z.245 -> Internal IP: 192.168.1.110) - Added a WAN rule to allow anything with destination 192.168.1.110, protocol any (which allows everything, including icmp and http) (After doing these steps we lost internet connectivity on our local server 192.168.1.110) - Added an Outbound NAT rule (example: to translate 192.168.1.110 to X.Y.Z.245) Experienced behavior: - Pinging the local server IP from the firewall works fine - Pinging the public IP (which is NATted to a local IP) from outside times out - IP addresses were configured on a laptop connected directly to Comcast and all of them worked properly List of IP addresses and whether they work on pfSense as 1:1 NAT configuration: xx.xx.xx.241/28 - WORKS as pfsense WAN IP xx.xx.xx.242/28 - WORKS xx.xx.xx.243/28 - DOESN'T WORK xx.xx.xx.244/28 - WORKS xx.xx.xx.245/28 - DOESN'T WORK xx.xx.xx.246/28 - DOESN'T WORK xx.xx.xx.247/28 - DOESN'T WORK xx.xx.xx.248/28 - DOESN'T WORK xx.xx.xx.249/28 - WORKS xx.xx.xx.250/28 - WORKS xx.xx.xx.251/28 - WORKS xx.xx.xx.252/28 - WORKS xx.xx.xx.253/28 - DOESN'T WORK xx.xx.xx.254/28 - Comcast Gateway We expect a knowledgeable person to find the cause of this issue and reconfigure pfsense so that all IP addresses can be configured as 1:1 NAT IP mapping. ... The following actions were taken: - Added a Virtual IP as IP Alias for each IP address (example: X.Y.Z.245/28) - Added a 1:1 NAT mapping rule on the WAN interface (example: External subnet IP X.Y.Z.245 -> Internal IP: 192.168.1.110) - Added a WAN rule to allow anything with destination 192.168.1.110, protocol any (which allows everything, including icmp and http) (After doing these steps we lost internet connectivity on our local server 192.168.1.110) - Added an Outbound NAT rule (example: to translate 192.168.1.110 to X.Y.Z.245) Experienced behavior: - Pinging the local server IP from the firewall works fine - Pinging the public IP (which is NATted to a local IP) from outside times out - IP addresses were configured on a laptop connected directly to Comcast and all of them worked properly List of IP addresses and whether they work on pfSense as 1:1 NAT configuration: xx.xx.xx.241/28 - WORKS as pfsense WAN IP xx.xx.xx.242/28 - WORKS xx.xx.xx.243/28 - DOESN'T WORK xx.xx.xx.244/28 - WORKS xx.xx.xx.245/28 - DOESN'T WORK xx.xx.xx.246/28 - DOESN'T WORK xx.xx.xx.247/28 - DOESN'T WORK xx.xx.xx.248/28 - DOESN'T WORK xx.xx.xx.249/28 - WORKS xx.xx.xx.250/28 - WORKS xx.xx.xx.251/28 - WORKS xx.xx.xx.252/28 - WORKS xx.xx.xx.253/28 - DOESN'T WORK xx.xx.xx.254/28 - Comcast Gateway We expect a knowledgeable person to find the cause of this issue and reconfigure pfsense so that all IP addresses can be configured as 1:1 NAT IP mapping. ... The following actions were taken: - Added a Virtual IP as IP Alias for each IP address (example: X.Y.Z.245/28) - Added a 1:1 NAT mapping rule on the WAN interface (example: External subnet IP X.Y.Z.245 -> Internal IP: 192.168.1.110) - Added a WAN rule to allow anything with destination 192.168.1.110, protocol any (which allows everything, including icmp and http) (After doing these steps we lost internet connectivity on our local server 192.168.1.110) - Added an Outbound NAT rule (example: to translate 192.168.1.110 to X.Y.Z.245) Experienced behavior: - Pinging the local server IP from the firewall works fine - Pinging the public IP (which is NATted to a local IP) from outside times out - IP addresses were configured on a laptop connected directly to Comcast and all of them worked properly List of IP addresses and whether they work on pfSense as 1:1 NAT configuration: xx.xx.xx.241/28 - WORKS as pfsense WAN IP xx.xx.xx.242/28 - WORKS xx.xx.xx.243/28 - DOESN'T WORK xx.xx.xx.244/28 - WORKS xx.xx.xx.245/28 - DOESN'T WORK xx.xx.xx.246/28 - DOESN'T WORK xx.xx.xx.247/28 - DOESN'T WORK xx.xx.xx.248/28 - DOESN'T WORK xx.xx.xx.249/28 - WORKS xx.xx.xx.250/28 - WORKS xx.xx.xx.251/28 - WORKS xx.xx.xx.252/28 - WORKS xx.xx.xx.253/28 - DOESN'T WORK xx.xx.xx.254/28 - Comcast Gateway We expect a knowledgeable person to find the cause of this issue and reconfigure pfsense so that all IP addresses can be configured as 1:1 NAT IP mapping.
Skills: PfSense Computer Networking
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 30+ hrs/week - Posted
We are looking for Cisco/Mikrotik/pfsense Routing and Switching experts to support and troubleshoot our network, We have an issue in routing, and we need to implement VPN site-to-site between different vendors like cisco - mikrotik - fortigate - juniper - pfsense So please apply if you have intensive experience in overall things above. ... We are looking for Cisco/Mikrotik/pfsense Routing and Switching experts to support and troubleshoot our network, We have an issue in routing, and we need to implement VPN site-to-site between different vendors like cisco - mikrotik - fortigate - juniper - pfsense So please apply if you have intensive experience in overall things above.
Skills: PfSense Cisco Certified Network Professional (CCNP) Cisco Certified Network Associate (CCNA) Mikrotik RouterOS
Hourly - Expert ($$$) - Est. Time: 1 to 3 months, 10-30 hrs/week - Posted
We would like consulting assistance too: 1) Build out a base image with a standard packages of free and/or paid plug ins. 2) Establishing policy based firewall, managing exceptions and zones. 3) Setting up Antivirus Filtering 4) HTTPS deep-packet inspection using something like Squid Proxy 5) Fail-over with dual ISP 6) Managing VoIP traffic in conjunctions with fail-overs 7) OpenVPN for remote user access 8) managing multiple routers centrally 9) establishing a centralized patching and backup regime for the router's firmware 10) IPS/IDS (Snort) 11) Rebranding the router as E-N Computers 12) Reediness for IP v6 To be successfully in the engagement you will need to be able too: 1) Be available speaking English by phone or e-mail during business hours (8 AM - 5PM) Eastern Time USA 2) Be a true expert in Routing and IP Networks as well as PFSense and related topics such as Squid and FreeBSD 3) Be able to work with Cisco Certified engineers and train them on PFSense You will be working directly with our busy Network Engineers, several of whom are CCNP or CCNA. ... We would like consulting assistance too: 1) Build out a base image with a standard packages of free and/or paid plug ins. 2) Establishing policy based firewall, managing exceptions and zones. 3) Setting up Antivirus Filtering 4) HTTPS deep-packet inspection using something like Squid Proxy 5) Fail-over with dual ISP 6) Managing VoIP traffic in conjunctions with fail-overs 7) OpenVPN for remote user access 8) managing multiple routers centrally 9) establishing a centralized patching and backup regime for the router's firmware 10) IPS/IDS (Snort) 11) Rebranding the router as E-N Computers 12) Reediness for IP v6 To be successfully in the engagement you will need to be able too: 1) Be available speaking English by phone or e-mail during business hours (8 AM - 5PM) Eastern Time USA 2) Be a true expert in Routing and IP Networks as well as PFSense and related topics such as Squid and FreeBSD 3) Be able to work with Cisco Certified engineers and train them on PFSense You will be working directly with our busy Network Engineers, several of whom are CCNP or CCNA. ... The goal of this engagement and hiring a consultant is to reduce the time it would take our engineers to learn all of the tricks of using PFSense or a similar open source system. This will likely be a one time stand up project.
Skills: PfSense Cisco Certified Network Professional (CCNP) Firewall FreeBSD