REMOTE ACCESS FROM HOTSPOTS.
(Why I changed the firewall.)
I was in the need of a gateway server that could give me this:
1. A reliable ip telephone logon server, that works well, from hotspots where SIP clients normally will not work, due to technical limitations.
2. The ability to perform full remote controll og the gateway server itself and lan resources from hotspots where a ordinary SSH port 22 tunnel will not work.
3. The hosting of web applications for private and no public access. They should still be available for private use from restricted wlan zones.
Now everything works like it should in a stable and reliable way.
To do this "mod" I needed a little bit of technical information from this forum. I got a series of negative comments and feedbacks, but some of them also contained the technical information that were needed.
For the iptelephony part of it I did this:
1. I first installed the selintra Asterisk for SME 7.2 contrib.
2. As the SIP protocol has rather poor performance for the use from hotspot's/public wlan's I desided to use a IAX2 telephony client instead.
3. I decided to use zoipier and installed this on my notebook
http://www.zoiper.com/4. I reconfigured the SME 7.2 server to receive IAX2 logon and data transport on udp port 4569 plus UDP 53 plus eventually other UDP ports as required.
For the remote control part I did this:
1. I downloaded and installed putty to my notebook:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html2. I also downloaded and installed winscp to my notebook:
http://winscp.net/eng/download.php3. I then reconfigured the SME 7.2 to receive ssh logon and perform ssh tunneling on TCP 22 and TCP 443 plus eventually other TCP ports as needed.
4. Putty can now do remot ssh shell logon to the gateway and the lan resources from almost any hotspot.
5. It can also do ssh tunneling via port 443 to the gateway and to the lan resources.
6. Graphical file management is available on the gateway and the lan resources via winscp that operates via the tcp 443 ssh tunnel set up by putty.
7. The server manager is available from restricted hotspots on the notebook like this: https.//localhost/server-manager/ (And all private web applications is also available the same way.)
The telephony and the remote access/control solution has been tested from diverse hot spots and wlans and also via 3G on mobile telephones. Works. Also expected to work on other kind of radio transmission based internet connections, but has not tested this yet.
For my individual need the project is now ended as everything works like it should.
If any positive interest I could post a detailed procedure for it all, so other people could need to use a few hours less on such a project than I did.
The administrators of the contribs.org might think that it is negative that some people try to do something on their own, but to have the full picture of a modified firewall solution will work as a whole and complete implementation, it is not possible to just do some minor adjustment on the existing templates. First solutions has to be be tested as a working complete solution, to see how things can or can not work, then they can be implemented.
By the way as a spin off of the same project I also tested out with a 3'rd NIC as dmz or secure wlan zone. This also worked quite well, but that's another story.
All of this is actually rather easy to implement if just some smiles and positive attitude about it all.

By the way .. the question of security .. There is now only one externally accessable tcp service and that is the ssh server. The open "port" is filtered against ip spoofing, tcp flag spoofing and overload due to dos attack. All other direct external access to server functions is blocked out.