Saludos bellera, mi proveedor de ISP me dice que debo de recrear las políticas que tienen en su router en el firewall; esto debido a que cuando puse el pfsense en funcionamiento la red local funciono sin problemas pero las otras sedes podían hacerse ping pero no entraban a internet o solo carga las paginas que estaban en favoritos y el estado de la conexión estaba normal. Que me recomendarías para solucionar esto, abajo pongo los datos del cliente, como o en que secciones tendria que cambiarlos en el pfsense, pues hay una que es en las reglas de NAT del pfsense pero las otras no se donde. Desde ya muchas gracias.
!
! No configuration change since last restart
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec
service timestamps log datetime msec localtime show-timezone
service password-encryption
no service dhcp
!
hostname CID008746
!
boot-start-marker
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 8
logging buffered 4096 informational
logging console critical
enable secret 5
!
aaa new-model
!
!
aaa authentication fail-message ^CC .Authentication Fails. Please try again, only 3
options.
aaa authentication login default group tacacs+ local
aaa authentication login CONSOLE group tacacs+ local
aaa authentication login AUXILIAR group tacacs+ local
aaa authentication login VIRTUAL_TERMINAL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa authorization commands 1 default group tacacs+ none
aaa authorization commands 15 default group tacacs+ none
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
!
aaa session-id common
clock timezone pet -5
no ip source-route
ip cef
!
!
interface FastEthernet0/1
description Interface LAN
bandwidth 35000
ip address 171.15.10.221 255.255.255.0 secondary
ip address 191.a.b.113 255.255.255.XX
no ip unreachables
no ip proxy-arp
ip accounting output-packets
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
service-policy output POLICY-SHAPE-INTERNET
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.100.8.113 name CORE_OPTICAL
ip route 171.15.20.0 255.255.255.0 171.15.10.28 name CNX_TO_SITE00
ip route 171.15.30.0 255.255.255.0 171.15.10.28 name CNX_TO_SITE01
ip route 171.15.40.0 255.255.255.0 171.15.10.28 name CNX_TO_SITE02
ip route 171.15.50.0 255.255.255.0 171.15.10.28 name CNX_TO_SITE03
ip route 171.15.60.0 255.255.255.0 171.15.10.28 name CNX_TO_SITE04
ip route 192.168.110.0 255.255.255.0 171.15.10.28 name CNX_TO_SITE05
!
ip nat inside source list 10 interface FastEthernet0/1 overload
ip nat inside source static tcp 171.15.10.7 8091 191.a.b.116 8091 extendable
ip nat inside source static tcp 171.15.20.175 22 191.a.b.119 22 extendable
ip nat inside source static tcp 171.15.20.175 80 191.a.b.119 80 extendable
ip nat inside source static tcp 171.15.20.175 5432 191.a.b.119 5432 extendable
ip nat inside source static tcp 171.15.10.33 80 191.a.b.120 80 extendable
access-list 10 permit 192.168.110.0 0.0.0.255
access-list 10 permit 171.15.10.0 0.0.0.255
access-list 10 permit 171.15.20.0 0.0.0.255
access-list 10 permit 171.15.30.0 0.0.0.255
access-list 10 permit 171.15.40.0 0.0.0.255
access-list 10 permit 171.15.60.0 0.0.0.255
access-list 10 permit 171.15.50.0 0.0.0.255