• Need to connect via different subnet over IPSec VPN

    Locked
    9
    0 Votes
    9 Posts
    6k Views
    D
    On the subject of NAT before IPsec VPN (not supported in pfsense 2.0), you can also read http://redmine.pfsense.org/issues/1855
  • 1:1 NAT in 2.0 Release, display incorrect IP on outbound connections

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    G
    I created the ip as a virtual ip and not in 1:1 and then created NAT rules, and set the outbound nat accrdong to the need I had. It did work AFTER i rebooted the ISP modem in this fashion. I suspect it will also work in 1:1 as well. I feel like there should be a big fat sticky note somewhere on 1:1 and modems and arp (as in sticky or note in the pfsense gui)…
  • Asterisk running ON pfSense2.

    Locked
    7
    0 Votes
    7 Posts
    4k Views
    B
    marcelloc> very interesting, I'll dig into that! Now everything is ok, calls in all directions…fine tuning on: voicemail,codecs order, redirection,call transfert, pickup call...
  • How to create NAT for block of IP's?

    Locked
    15
    0 Votes
    15 Posts
    5k Views
    M
    create proxy arp or virtual ip for every single ip you have. 1:1 transfer any trafic but only one client/server(unless using server loadbalancing) with portforward you can decide what trafic you want to server have and can use multiple servers(ex. port 80 -> server1, port 25 -> server2 etc.)
  • Port forwarding not (always) working in VM

    Locked
    7
    0 Votes
    7 Posts
    5k Views
    johnpozJ
    You know I tried this quite some time ago, and was not working on vmware 2.0 server - forwards would not work to devices that were using a bridged interface on the HOST machine.  But to other physical devices in the network it would work. I gave up, since fowarding to other virtual machines is a requirement for me. Now I have moved away from vmware 2.0 server, hardware is not capable of running esxi – and I know virtual box has recently enabled promiscuous option.  So I might have to re attempt this.. Here was my old thread http://forum.pfsense.org/index.php/topic,27599.0.html
  • Proxy ARP for dummies

    Locked
    6
    0 Votes
    6 Posts
    9k Views
    T
    hi ! i tried your configuration. here is the result: Red:192.168.10.250/24 –--  WAN:192.168.10.254/24:| PFSense |LAN:192.168.2.254/24 --- Green:192.168.2.100/24         NO Gateway !                                                                                                                      GW: 192.168.2.254 ARP-Proxy on WAN: 192.168.10.100 (single address) 1:1 NAT on WAN: External 192.168.10.0                           Internal 192.168.2.0/24 Http request is successfull ! thanks for your support. –--------------------  packets on WAN side:---------------------------------                        ---------------  packets on LAN side:---------------------------------  SYN :      Destination IP = 192.168.10.100 , Source IP = 192.168.10.250  >>>  (pfsense) >>>  Destination IP = 192.168.2.100, Source IP = 192.168.10.250 SYN,ACK: Destination IP = 192.168.10.250 , Source IP = 192.168.10.100  <<< (pfsense) <<< Destination IP = 192.168.10.250, Source IP = 192.168.2.100 ACK:        Destination IP = 192.168.10.100 , Source IP = 192.168.10.250  >>>  (pfsense) >>>  Destination IP = 192.168.2.100, Source IP = 192.168.10.250 from 192.168.10.100 perspective, the webserver is in the same subnet as the client. the client can connect to the server without using a default gateway. Next step should be, that client and server are connected with a vpn-tunnel.... ::) :'(
  • I have more than 1 Public IP… how i use it?...

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    P
    You would use Virtual IPs and NAT. Please search docs.pfsense.com on how to set them up.
  • Port forwarding nat issue with two gateways

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Manual outbound NAT of OpenVPN interface does not always work

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • 1:1 NAT for dummies

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    T
    to complete this threat: by adding a virtual ip range (10.1.0.0/24) also on green port, and changing the 1:1 nat rule (Internal IP = 10.1.0.0/24)  the following is possible: red-PC–-------------------192.168.10.254| pfSense |192.168.2.254------------------------green-PC2---------green-PC       192.168.10.250                                              ----------                                                      10.1.0.111        192.168.2.100 ping 192.168.12.111 S: 192.168.10.250          >>>>>>>>>>>>>>request >>>>>>>>>>>>>>>>> >>>>>  S: 192.168.10.250       D: 192.168.12.111    >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>    D: 10.1.0.111 S: 192.168.12.111        <<<<<<<<<<<<<<<<<reply<<<<<<<<<<<<<<<<<<<<  s:="" 10.1.0.111<br="">      D: 192.168.10.250            <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<  D: 192.168.10.250 ping 192.168.2.100 S: 192.168.10.250  >>>>>>>>>>>>>>request >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>  S: 192.168.10.250       D: 192.168.2.100 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>    D: 192.168.2.100 S: 192.168.2.100  <<<<<<<<<<<<<<<<<<<<<<<<<<<<reply<<<<<<<<<<<<<<<<<<<<<<<<<<<   ="" s:="" 192.168.2.100<br="">      D: 192.168.10.250  <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<  D: 192.168.10.250 ping 192.168.12.100 will not work</reply<<<<<<<<<<<<<<<<<<<<<<<<<<< ></reply<<<<<<<<<<<<<<<<<<<< >
  • Port forwarding failed

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    GruensFroeschliG
    http://doc.pfsense.org/index.php/Port_Forward_Troubleshooting
  • Port Forwarding not working

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    C
    Hi m8 Make sure that the pfsense router is in the DMZ zone. Next go to the web interface of pfSense and go to the tab interfaces ==> WAN. After that make sure that you look for the title "Private networks" and DISABLE "Block private networks" and "Block bogon networks"!!! I had the same problem as you today and I've almost thrown the pc into pieces out of frustation thanks to those checkboxes. I hope it solves your problem as well. Grtz
  • Inbound NAT doesnt have source NATing

    Locked
    3
    0 Votes
    3 Posts
    7k Views
    K
    GruensFroeschli, Thanks a lot. That worked perfectly ! I've been trying for hours to get that working. Regards, Andrew
  • Port forwarding while hiding public address

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    B
    Nevermind. Thanks to anyone that spent any thought on this before I figured it out myself. Virtual IP at 10.1.4.2, changed to manual outbound NAT, set an outbound NAT rule: Interface "LAN2", Source any, destination 10.1.4.98, NAT address of the Virtual IP
  • Subdomain Port Forward

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    Cry HavokC
    You can't NAT by domain name, since NAT works at the IP layer. You could however install a reverse proxy (such as HA Proxy) and have it handle that, since that is one of the things it is designed to do.
  • 3 of the SAME rule in my Manual Outbound NAT – Can I delete these two?

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    S
    @Metu69salemi: i have no glue why there is those localhost rules, but it don't do any harm to have 'em. but showing your public ip's is never good idea. Thanks for pointing that out Metu…  I usuall "****" or <blank>them out.  Had given it a quick look but forgot I had added them on the right side as translation addresses there.</blank>
  • 0 Votes
    3 Posts
    2k Views
    S
    Got it working… Since all my LAN subnets need to go out the same VIP - I simply created an NETWORK TYPE ALIAS from the "FIREWALL" tab and then added all 4 of my subnets to that. Then adjusted the AON outbound rules to use that alias.  Adjusted the firewall rules to use that Alias. It's now working! Many thanks to all who helped!
  • How to configure pfsense network

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    Cry HavokC
    There's nothing fancy about it - nothing different to any other networking. The default gateway is the directly connected IP address of the router, in your case 192.168.1.1. The netmask will be 255.255.255.0. Alternatively, just configure them for DHCP and let pfSense handle it.
  • Outbound port forward

    Locked
    9
    0 Votes
    9 Posts
    5k Views
    B
    Yes, i know that… but my boss dreams with angels and i have to suffer.  :-[ By now the problem is solved, tks all. He preferred to change all the clients manually, so i´ll suffer again in another way. Again, tks all that tried to help me. Danilo
  • NAT & Gateway on different machines

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    GruensFroeschliG
    yes.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.