• H.323 Video Conference Codec behind PFSense *Guide / Explanation*

    Pinned Locked
    3
    0 Votes
    3 Posts
    29k Views
    D
    Long story short, to use H.323 behind a pfsense firewall, one needs to enable static-port NAT. Unfortunately neither H.323 nor SIP were designed with NAT in mind, in which case one needs either an ALG (which btw is part of Linux's netfilter since many years, but apparently missing from baseline pf/FreeBSD) or a NAT device that won't rewrite ports (a solution that will work if you only have one such device). Edit: Note that SIP software has been improved in recent years, and most recent implementations can work through NAT without a need for ALG or static ports, but it's still something one has to keep in mind when troubleshooting SIP issues.
  • Port Forward Troubleshooting

    Pinned Locked
    1
    3 Votes
    1 Posts
    32k Views
    No one has replied
  • NAT Reflection Issue w/ LAN Host

    3
    0 Votes
    3 Posts
    121 Views
    M
    @Jaritura Thank you for your reply! I replicated the settings from my former pfsense box to the new one and confirmed with what you said above. Im still missing something. On both systems I Pure NAT, Enable NAT Reflection 1:1, and Enable automatic outbound NAT for Reflection selected. Firewall -> Rules -> WAN has the required ports forwarded IPV4 TCP/UDP * * Server IP 80 * none Firewall -> NAT ->Port Forward the same required ports are forwarded WAN TCP/UDP * * WAN address 80 Server IP 80 Firewall -> NAT -> Outbound I have both set to Automatic outbound NAT rule generation mode along with two Mappings for each subnet: WAN "Network subnet" * * 500 WAN address * (Not sure why this is here? Not knowingly using IPSec) WAN "Network subnet" * * * WAN address * Neither is using a DNS Resolver
  • Publishing a remote WireGuard endpoint through pfSense WAN IP

    1
    0 Votes
    1 Posts
    32 Views
    No one has replied
  • 0 Votes
    7 Posts
    91 Views
    S
    @patient0 I’d run into/posted this a while back and it was driving me nuts. Good to hear FreeBSD fixed it. Or accounted for it.
  • 0 Votes
    8 Posts
    105 Views
    tinfoilmattT
    @jliolios Got it, got it. Alright, this all makes much more sense now. Foundational understandings: 1.) When you assign pfSense's GUI (called the webConfigurator) a port, it listens on all interfaces, including both WAN and LAN. Since most people never 'open' this port to inbound connections on the WAN interface, it typically never presents a conflict or a problem that the webConfigurator's nginx-based web server listens on all interfaces by default. (See this post for a recent thread on this point.) 2.) You have both: 'Opened' port 9443 on the WAN interface; and Crafted a NAT rule to forward any/all inbound 9443-destined traffic arriving on the WAN interface, to be 'redirected' to the EZProxy host that I'm assuming is not homed to 172.16.0.1 3.) At some later point, you changed the webConfigurator's listening port to 9443. It would not have been readily apparent at that time that inbound 9443-destined traffic arriving on the WAN interface now had two potential and conflicting routes to take: the webConfigurator webserver, and the EZProxy LAN host. With all that being said, and returning to your original question, what do you mean when you've said: [in Use of a custom port for admin console caused issue with NAT using same port:] in this case 443 took a back seat to 9443
  • What is needed for NAT64?

    2
    0 Votes
    2 Posts
    60 Views
    patient0P
    @mcfly9 yep, that is what you need, together with DNS64, I do use the standard NAT64 prefix. In the pfSense doc it's mentioned to enable PRE64 in the router advertisment. It does work for me without it. pfSense doc: NAT64 ... pfsense ignoring the first 96 bits of the destination IP address ... The NAT64 prefix is not ignored but the whole is translated and the information (src, dst & port) is keep since pfSense gotta know where to send the return traffic.
  • Hybrid NAT rules not working on multi-wan multi-wan seup

    8
    0 Votes
    8 Posts
    154 Views
    C
    Never mind, I figured it out via the firewall rules.
  • NAT Port Forward - Destination port range overlaps with an existing entry

    6
    0 Votes
    6 Posts
    307 Views
    KahnaresK
    @SteveITS I haven't tried disabling or removing Outbound rules, but it's worth a shot. I'm not sure it would make a difference, but stranger things have happened and it's quick'n'easy to test. Outbound is just directing traffic to the gateways (ISP or VPN, depending on the VLAN). I'll test my loopback theory too.
  • Outbound NAT also first match wins?

    2
    0 Votes
    2 Posts
    163 Views
    V
    @Bob.Dig Yes, of course. "First match wins" is also applied to port forwardings and outbound NAT rules.
  • TFTP cross vlan and TFTP proxy

    1
    0 Votes
    1 Posts
    178 Views
    No one has replied
  • Access a service using a link local address

    2
    0 Votes
    2 Posts
    266 Views
    P
    Edit the IDRAC network settings, and set a static IP.
  • NAT to different interface than WAN

    10
    0 Votes
    10 Posts
    2k Views
    V
    @Pagi So I guss, the NAT address changed to the WAN address. Set it to LAN3 address and it should do, what you want.
  • [Tutorial] How to Secure and Implement Internal IPv6 NAT66/NPt

    4
    2 Votes
    4 Posts
    5k Views
    M
    UPDATE: I now recommend absolutely to avoid ULAs (fd:: and fc:: due to RFC 6724) it seems that those specific subnets will usually prioritise IPv4 traffic and other oddities so you can absolutely use them for special use cases but for a LAN or a dual stack setup I recommend the other f000::/4 subnets which work because they're not official ULAs (so I guess I want them to be that way now).
  • Issue with local Ubuntu VPN behind PFsense

    13
    0 Votes
    13 Posts
    3k Views
    GertjanG
    @alexanderjh said in Issue with local Ubuntu VPN behind PFsense: this is really tricky with UDP. The thing is, I use the pfSense Openvn server, that uses the default UDP and default 1194 port. I don't know anything about "IPSEC" and "strongwan". What protocol number it is, if it uses ports, etc Keep mind that your issue isn't pfSense related right now. Here : proof : [image: 1758006997553-20acf017-6cdd-4194-925f-e19a72353f95-image.png] your VPN traffic never even reaches the pfSense WAN port. It can't redirect what it didn't receive ^^ That said (example) : if IPSEC is using IPv4 and UDP, and port '45000' as a destination. Your rules do work fine for traffic with destination port 80 and 443, TCP, IPv4 - the web server traffic.
  • AI Copilot get a tip! Is it a safe and good practise?

    6
    0 Votes
    6 Posts
    3k Views
    A
    @jimp Ok , thanks)))
  • FreePBX & pfsense

    4
    0 Votes
    4 Posts
    5k Views
    S
    @netblues Can you Post you Setup?
  • 0 Votes
    9 Posts
    4k Views
    johnpozJ
    @sho1sho1sho1 nothing in the resolver would or could do that.. You running pfblocker? Show the rule in your ruleset. There is this feed in pfblocker [image: 1755628936429-pfblocker.jpg] That sure doesn't even look like a NS ;; QUESTION SECTION: ;4.64.4.64.in-addr.arpa. IN PTR ;; ANSWER SECTION: 4.64.4.64.in-addr.arpa. 28800 IN PTR wnpgmb0273w-dr09-v924.mts.net. And it doesn't even answer dns, atleast not from me. That is a bell canada IP.. Is that who you use for ISP?
  • Setup UPnP->few quick questions? (solved)

    solved
    9
    1 Votes
    9 Posts
    5k Views
    4
    @johnpoz -Yep-that worked just fine Jonpoz. TYVM.
  • 2.8.0 NAT64 and Policy Routing

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.