Hi,
My Asus RT-AC68U is currently the first point of connection for several of my machines. It has some services running on his own also (openvpn client and server, samba server, media server, etc). As part of experimentation, it's usually behind some pure firewall (Watchguard, ZyWALL, etc) who in turns goes directly to my modem/router. Everything works fine as long as I keep the Asus' NAT on, with the drawback that from the firewall point of view, anything behind the Asus is of course seen with a single IP (the Asus' WAN), which doesn't allow much control.
Trying to expose the Asus' clients directly to the firewall, I've gone through what would the implications be in changing the operation mode from Wireless router to AP, and I'm not sure I want to give up the services that disappear along with the WAN interface.
After fiddling a bit with the network I found that I can connect the Asus' switch directly to the firewall and, by disabling the Asus' LAN DHCP server, having them directly in the same firewall's LAN subnet. I can also keep the Asus' WAN connected to the firewall and it's services working, but on a separate subnet. I could make the two talk each other, but at this point I've already lost Asus AI Protection (which I'm getting used to when browsing), and can't benefit of the Asus' VPN client for my work's connections (since traffic from the LAN clients are by-passing the WAN interface where the VPN transits).
So I think that the perfect setup would be to keep the Asus working like a router, with just the WAN interface connected to the firewall, and all the traffic between the outside and it's clients going through it, but with NAT disabled. For my current level of networking understanding, that should conceptually work. The Asus would route inboud/outboud packets as usual, just not translating them from/to a single (WAN) IP address.
But ... I can't make it work so far. Anyone has any hint ? Or, to put it another way, am I trying something impossible ?
Thanks in advance
Peppe
My Asus RT-AC68U is currently the first point of connection for several of my machines. It has some services running on his own also (openvpn client and server, samba server, media server, etc). As part of experimentation, it's usually behind some pure firewall (Watchguard, ZyWALL, etc) who in turns goes directly to my modem/router. Everything works fine as long as I keep the Asus' NAT on, with the drawback that from the firewall point of view, anything behind the Asus is of course seen with a single IP (the Asus' WAN), which doesn't allow much control.
Trying to expose the Asus' clients directly to the firewall, I've gone through what would the implications be in changing the operation mode from Wireless router to AP, and I'm not sure I want to give up the services that disappear along with the WAN interface.
After fiddling a bit with the network I found that I can connect the Asus' switch directly to the firewall and, by disabling the Asus' LAN DHCP server, having them directly in the same firewall's LAN subnet. I can also keep the Asus' WAN connected to the firewall and it's services working, but on a separate subnet. I could make the two talk each other, but at this point I've already lost Asus AI Protection (which I'm getting used to when browsing), and can't benefit of the Asus' VPN client for my work's connections (since traffic from the LAN clients are by-passing the WAN interface where the VPN transits).
So I think that the perfect setup would be to keep the Asus working like a router, with just the WAN interface connected to the firewall, and all the traffic between the outside and it's clients going through it, but with NAT disabled. For my current level of networking understanding, that should conceptually work. The Asus would route inboud/outboud packets as usual, just not translating them from/to a single (WAN) IP address.
But ... I can't make it work so far. Anyone has any hint ? Or, to put it another way, am I trying something impossible ?
Thanks in advance
Peppe