root@firewallsm:~ # tcpdump -i vmx0 host 10.0.64.42 and host 8.8.8.8 and icmptcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on vmx0, link-type EN10MB (Ethernet), capture size 262144 bytes06:17:09.324409 IP 10.0.64.42 > dns.google: ICMP echo request, id 1, seq 1, length 4006:17:13.853917 IP 10.0.64.42 > dns.google: ICMP echo request, id 1, seq 2, length 4006:17:18.858484 IP 10.0.64.42 > dns.google: ICMP echo request, id 1, seq 3, length 40
root@firewallwm:~ # tcpdump -i em0 host 8.8.8.8 and icmp -ntcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on em0, link-type EN10MB (Ethernet), capture size 262144 bytes06:17:09.335331 IP 10.0.64.42 > 8.8.8.8: ICMP echo request, id 1, seq 1, length 4006:17:13.865408 IP 10.0.64.42 > 8.8.8.8: ICMP echo request, id 1, seq 2, length 4006:17:23.870819 IP 10.0.64.42 > 8.8.8.8: ICMP echo request, id 1, seq 4, length 40
root@firewallwm:~ # tcpdump -i em1 host 8.8.8.8 and icmp -ntcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on em1, link-type EN10MB (Ethernet), capture size 262144 bytes
root@firewallsm:~ # ping 8.8.8.8PING 8.8.8.8 (8.8.8.8): 56 data bytes64 bytes from 8.8.8.8: icmp_seq=0 ttl=127 time=13.196 ms64 bytes from 8.8.8.8: icmp_seq=1 ttl=127 time=12.625 ms64 bytes from 8.8.8.8: icmp_seq=2 ttl=127 time=12.609 ms^C--- 8.8.8.8 ping statistics ---16 packets transmitted, 16 packets received, 0.0% packet lossround-trip min/avg/max/stddev = 11.705/13.026/15.910/1.111 ms
root@firewallwm:~ # tcpdump -i em0 host 8.8.8.8 and icmp -ntcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on em0, link-type EN10MB (Ethernet), capture size 262144 bytes06:22:21.816908 IP 192.168.10.7 > 8.8.8.8: ICMP echo request, id 23594, seq 0, length 6406:22:21.827095 IP 8.8.8.8 > 192.168.10.7: ICMP echo reply, id 23594, seq 0, length 6406:22:22.876598 IP 192.168.10.7 > 8.8.8.8: ICMP echo request, id 23594, seq 1, length 6406:22:22.886317 IP 8.8.8.8 > 192.168.10.7: ICMP echo reply, id 23594, seq 1, length 6406:22:23.948947 IP 192.168.10.7 > 8.8.8.8: ICMP echo request, id 23594, seq 2, length 6406:22:23.957978 IP 8.8.8.8 > 192.168.10.7: ICMP echo reply, id 23594, seq 2, length 64
root@firewallwm:~ # tcpdump -i em1 host 8.8.8.8 and icmp -ntcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on em1, link-type EN10MB (Ethernet), capture size 262144 bytes06:22:21.817029 IP 192.168.47.132 > 8.8.8.8: ICMP echo request, id 24689, seq 0, length 6406:22:21.826993 IP 8.8.8.8 > 192.168.47.132: ICMP echo reply, id 24689, seq 0, length 6406:22:22.876700 IP 192.168.47.132 > 8.8.8.8: ICMP echo request, id 24689, seq 1, length 6406:22:22.886219 IP 8.8.8.8 > 192.168.47.132: ICMP echo reply, id 24689, seq 1, length 6406:22:23.949057 IP 192.168.47.132 > 8.8.8.8: ICMP echo request, id 24689, seq 2, length 6406:22:23.957845 IP 8.8.8.8 > 192.168.47.132: ICMP echo reply, id 24689, seq 2, length 64
Is VM behide Firewall 2 Traffic NAT'd when its goes to Firewall 1?
Does Firewall 1 know to route 10.0.64.0/27 via Firewall2 192.168.28.0 address.So it knows where to send the return traffic to?
I'm not sure why you configured it as a 2nd gateway on FirewallA, you should be using just static routes "System: Routes: Configuration".What you should have is a static route to 10.0.64.0/27 to via the FirewallB address on the 192.168.28.0 network. If you start to use gateways you'll complicate things and may hit issues with reply-to.Once the static route on FirewallA is done, it'll know how to return taffic for a 10.0.64.0/27 VM, which it'll route to 192.168.28.0/27 address of FirewallB. So it can then forward the traffic back to teh VM on the otherside.I hope this makes more sense?
Remoted on to Tryllz setup and he'd had it all setup correctly, between the two firewalls, and the gateway is required for the static routes, something I forgot .The reason to why the internet didn't work was due to Outbound NAT. Since FirewallA doesn't see any external networks of FirewallB, so when you use Automatic NAT, it doesn't create rules for these networks.So I put his NAT in to manual mode and created 2 NAT rules which will cover 10.0.0.0/8 and 192.168.0.0/16, so when he creates any new external private networks be hide FirewallB, they'll get internet access if the firewall lets them.I would of created a ALIAS called RFC1918 and then used that as the source on the NAT rule, but since the browser was being glitchy and wouldn't open then new alias model, I had to do it this way.This issue should now be resolved as Tryllz can now reach the internet on the VM he couldn't do before.