• H.323 Video Conference Codec behind PFSense *Guide / Explanation*

    Pinned Locked
    3
    0 Votes
    3 Posts
    25k Views
    D

    Long story short, to use H.323 behind a pfsense firewall, one needs to enable static-port NAT.

    Unfortunately neither H.323 nor SIP were designed with NAT in mind, in which case one needs either an ALG (which btw is part of Linux's netfilter since many years, but apparently missing from baseline pf/FreeBSD) or a NAT device that won't rewrite ports (a solution that will work if you only have one such device).

    Edit: Note that SIP software has been improved in recent years, and most recent implementations can work through NAT without a need for ALG or static ports, but it's still something one has to keep in mind when troubleshooting SIP issues.

  • Port Forward Troubleshooting

    Pinned Locked
    1
    3 Votes
    1 Posts
    30k Views
    No one has replied
  • PORT FORWARDING NOT WORKING AFTER UPGRADE TO BETA 25.03

    2
    0 Votes
    2 Posts
    43 Views
    GertjanG

    @samweli

    The good news : nothing changed, so there shouldn't be any issues.
    For example, I've several NAT rules in place, I use the latest 25.03 Beta version "25.03.b.20250515.1415".

    Best guess : check if traffic reaches your WAN ?
    Use the packet capture ( Diagnostics > Packet Capture ), select the WAN, specify the correct "destination port" and NAT protocol, UDP or TCP and start the capture.
    Now you can see if traffic that was natted before, even reaches pfSense.

    Another check : the device you NAT to (some device on a LAN ?) still use the same IPv4 ?

  • NAT public IP through multi way

    3
    0 Votes
    3 Posts
    168 Views
    L

    @viragomann thanks a lot. From lan to wan works right.
    I must test how it works for some internal exposed services.

  • No "ports" in Port Forwarding

    3
    0 Votes
    3 Posts
    106 Views
    U

    @SteveITS , Thank you! Small oversight between chair and keyboard. I see it now.

    -JB

  • FreePBX & pfsense

    3
    0 Votes
    3 Posts
    169 Views
    N

    @STEPHANK Freepbx runs fine behind pfsense in various setups and is rather straight forward to configure
    In general not much is needed and in most cases not even any port forwards too.

    Do describe your configuration and setup.

  • Outbound NAT over IPSEC tunnel not working

    7
    0 Votes
    7 Posts
    180 Views
    S

    @viragomann said in Outbound NAT over IPSEC tunnel not working:

    @shaunmccloud said in Outbound NAT over IPSEC tunnel not working:

    And the minute I add a P2 entry in my pfSense box for a remote network of 0.0.0.0/0, all network traffic but local dies.

    So I'd assume, that the traffic is routed over the VPN, but not out on WAN.

    But this is only the half of the battle. The traffic must be natted on the remote site

    If the Meraki doesn't masquerade your subnets there is no way to go out to the internet through it.

    I decided to cheat, and throw a virtual pfSense box in the data center to connect to. I'll see how that works tomorrow.

  • Simple port forward error default deny rule ipv4

    6
    0 Votes
    6 Posts
    205 Views
    johnpozJ

    @TheCalvinator glad to hear finally sorted. Thanks.

  • Local DMZ to filter traffic for game server.(Category may be wrong)

    1
    0 Votes
    1 Posts
    44 Views
    No one has replied
  • SNAT IPsec not work

    13
    0 Votes
    13 Posts
    470 Views
    A

    @viragomann

    Morning my friend, some news about topic?

  • Upnp issue

    6
    0 Votes
    6 Posts
    285 Views
    G

    @Yasir Yeah, well unfortunately that's the way it's implemented so unless you can push for and get an update/improvement of the implementation, a script is the only other solution.

  • "NAT Reflection mode for port forwards" option

    1
    0 Votes
    1 Posts
    77 Views
    No one has replied
  • Cant DNAT to ovpn client

    3
    0 Votes
    3 Posts
    121 Views
    A

    @viragomann Thank you very much. you helped me understand very good whats going on.
    Moreover i managed to to make it wotk bu adding an snat outbound rule to the openvpn interface. thanks again.

  • SIP client on LAN ignoring 401 Unauthorized packet

    5
    0 Votes
    5 Posts
    222 Views
    w0wW

    @Zak-McKracken
    If the issue is suspected to be with the external IP and the Ricoh firmware, then it might be worth trying siproxd.

  • Host Website over IPsec to a QNAP

    3
    0 Votes
    3 Posts
    145 Views
    N

    @viragomann Thanks. going to do some reading up on this before I kills my pfselnse.

  • pfSense with port forward AND outbound NAT - rewrite source IP address

    7
    0 Votes
    7 Posts
    354 Views
    J

    @johnpoz said in pfSense with port forward AND outbound NAT - rewrite source IP address:

    @jarlel said in pfSense with port forward AND outbound NAT - rewrite source IP address:

    WHY? Because the DNS servers have different filters based on which source IPs the request comes from

    Even if you get that to work - you have a problem with the answers being cached in unbound.

    client A asks for something.tld, which is allowed for client A.

    Now client B asks for something.tld which should be blocked for client B, but unbound already has it cached, so it sends client B the answer.

    There is no difference in the filters for clients in the same "client group". All clients using VIP 1 as DNS-server has the same filter/rules. All clients using VIP 2 as DNS-server has the same filter/rules.

    The DNS-server is a public one with some special services/filtering, so all requests are considered and evaluated without caching.

  • Packets are not NAT'ted and encrypted when sent over IPSec2 interface

    9
    0 Votes
    9 Posts
    341 Views
    B

    @stephenw10

    Let me know if you need any info.

  • Redirecting all DNS Requests to pfSense?

    12
    0 Votes
    12 Posts
    3k Views
    MarinSNBM

    @Gertjan Thank you so much!

  • NAT 1:1 through Wireguard

    8
    0 Votes
    8 Posts
    349 Views
    _

    @viragomann said in NAT 1:1 through Wireguard:

    @_deadpool_
    It should work with an 1:1 like this:
    interface: WG (you wrote above you have assigned OPT1 to the wg instance)
    External subnet IP: 172.16.1.0
    internal IP: Network > 192.168.1.0/24 (or LAN subnet)
    ...

    ok, i modified the configuration using the interface WireGuard instead of OPT1 as you stated, but i'm in the same situation. in the peer configuration the subnet is already allowed.

    @viragomann said in NAT 1:1 through Wireguard:

    ...

    However as mentioned, you have to ensure, that 172.16.1.0/24 is allowed in the remotes WG settings and firewall.

    ...

    i don't understand this, tou mean there is something to do at site A? i don't think so, as at site B if i use a mikrotik it works without touching site A configuration. if it means that i have to do something in firewall>rules at site B i don't understand what i'm missing, even in site B i can't ping machines in LAN using 172.16.1.0/24 class. pinging from site A shows in packet capture:

    17:44:47.026691 IP 172.16.0.1 > 172.16.1.1: ICMP echo request, id 8335, seq 7, length 64
    17:44:47.026710 IP 172.16.1.1 > 172.16.0.1: ICMP echo reply, id 8335, seq 7, length 64

    which seems that packets are arriving from site A and they get replied, nut pinging another machine existing and up i get no reply, like this:

    17:46:37.026691 IP 172.16.0.1 > 172.16.1.100: ICMP echo request, id 8335, seq 7, length 64

    pinging from site B the WG ip of site b pfsense i get:

    17:48:44.450593 IP 172.16.0.1 > 172.16.0.2: ICMP echo request, id 55040, seq 57612, length 36
    17:48:44.450614 IP 172.16.0.2 > 172.16.0.1: ICMP echo reply, id 55040, seq 57612, length 36

    and i get the same pinging every host in 172.16.0.0/24 subnet from site B.

    i still can't figure out what i'm missing.

  • DNS Port Forward Inglês DOES NOT REDIRECT

    13
    0 Votes
    13 Posts
    444 Views
    M

    @frawnsmoc said in DNS Port Forward Inglês DOES NOT REDIRECT:

    replace pfsense with mikrotik matter solved pfsense has this bug

    ok

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.