• 0 Votes
    4 Posts
    495 Views
    johnpozJ

    @Ghost-0 if you want to remove the auto nat rules, you would have to go to manual mode.

  • NAT reflection, what am I missing

    5
    0 Votes
    5 Posts
    565 Views
    M

    @SteveITS I should have double checked that the server was listening on the default port.

    sorry for making the post as there was nothing wrong with how Pfsense was working. I just had to change the port forwarding to the port the server was listening on and it all started working.

  • Monitor NAT rules

    11
    0 Votes
    11 Posts
    2k Views
    GertjanG

    @Shan-lapierre said in Monitor NAT rules:

    And infact my NAT rule was created whit "Pass" flag and pf doesn't created any fw rule.

    I'm still looking for a usage of that "Pass" case ^^

    Normally, a NAT rule translates traffic coming (initiated) somewhere on 'the WAN' (the Internet) and the address (WAN IP) (and port) has to be mapped == translated (a,d port) to a LAN addresses, so it can reach this device.
    This needs of course a WAN 'firewall' rules, as by default nothing can enter the WAN - everything is blocked by default.
    A NAT rule without an accompanying firewall rule .... won't work, as traffic will never reach the NAT rule, as traffic can not enter into the WAN interface.

    I'm not saying other types of NAT exit, they do.

    From what I've read :

    receive traffic to my firewall on a specific port from a specific public IP.

    Everything is working (so the external traffic reaches me on an endpoint inside my network that is listening on that specific port).

    your use the classic method, and you need a auto generated firewall rule on the WAN interface.

  • Port Forward Add Unassociated Filter Rule Not Working?

    2
    0 Votes
    2 Posts
    338 Views
    Bob.DigB

    @tman222 said in Port Forward Add Unassociated Filter Rule Not Working?:

    Add unassociated filter rule

    I can confirm this behavior. An Unassociated Filter Rule is probably not selected often though.

  • NAT Reflection Rules or Split DNS for locally-hosted ARK Server?

    1
    0 Votes
    1 Posts
    350 Views
    No one has replied
  • Outbound NAT (hybrid) not working

    6
    0 Votes
    6 Posts
    1k Views
    johnpozJ

    @jrodrigomor said in Outbound NAT (hybrid) not working:

    Could you detail what the rule would look like or maybe even show me a print of this configuration?

    Here is an example, I have an outbound nat that says if you go out my ns1vpn, to nat to that address.. A rule that would force traffic out that gateway is placed on the interface where you have traffic you want to route out that gateway.

    policyroute.jpg

    You assign the specific gateway to a rule via the advanced when you setup the rule, notice the little gear next to the rule, that shows that an advanced setting was done on the rule.

  • Problemas para acesso RDP utilizando dual WAN

    1
    0 Votes
    1 Posts
    206 Views
    No one has replied
  • Inbound NAT redirect question

    2
    0 Votes
    2 Posts
    238 Views
    J

    OK, solved it myself: WAN interface rule needed to specify IP&port of internal (NATted) host. Changed that. Traffic passes.

    Thanks!

  • Internal port redirect

    10
    0 Votes
    10 Posts
    851 Views
    johnpozJ

    @Scarecrow4798 said in Internal port redirect:

    Would the best way of doing it then be to move dashy to another interface? VLAN?

    Sure if this dashy was on a different network that route through pfsense, you could redirect the traffic to a different port.

    Seems like of trouble, that could be solved with a simple :port on your bookmark ;)

  • Cannot PF/NAT to save my life...

    32
    0 Votes
    32 Posts
    4k Views
    G

    @Elmojo said in Cannot PF/NAT to save my life...:

    @johnpoz Okay, I'll have to dig into the docs a little and see where I need to go from here.
    I'm happy with using Clouflare, if it's built into pfsense. I only had a duckdns account because it was referenced in a tutorial I was following for another service a while back.

    Thanks again for all your help. Hopefully I can take it from here, but I can't swear I won't have another couple Qs as I get all this untangled. :)

    Duckdns have good support info on their page.

    Go to their install page https://www.duckdns.org/install.jsp
    Select pfsense and then in the drop down select which one of your domains you want to use.

    The page will then update to provide you with a URL looking like this:
    https://www.duckdns.org/update?domains=[DOMAIN]&token=[TOKEN]&ip=%IP%
    Where DOMAIN and TOKEN are generated from your account.

    In pfsense > services > Dynamic DNS, create a client and set the Service type to Custom.
    Select your interface to monitor and send update from (WAN typically).

    Then all you do is paste the URL you got from duckdns into the Update URL field.
    Type OK in the Result Match field, add a description if you like and click save.

  • Pfsense nat and certificate let'sencrypt

    4
    0 Votes
    4 Posts
    593 Views
    V

    @frankz
    For a quick start this Lawrence video may help: https://www.youtube.com/watch?v=gVOEdt-BHDY

    It should cover all what you need for above aims.

  • Upgraded Appliance, VOIP Audio broke

    2
    0 Votes
    2 Posts
    327 Views
    D

    For what it's worth. By setting my outbound rules up manually and having them use static ports, the issue seems to be resolved.

    Why the old appliance did not need this, and the new one does, I do not know. But hey, it works now!

  • VPN SITE TO SITE PFSENSE X CISCO, ERRO DE NAT

    1
    0 Votes
    1 Posts
    220 Views
    No one has replied
  • 0 Votes
    10 Posts
    1k Views
    provelsP

    Might want to look at incorporating DoH blocklists into your Pi.

    https://www.reddit.com/r/pihole/comments/lhkwta/doh_url_blocklist/?rdt=59763

  • one big WAN multiple pfSense cannot see each other on WAN

    9
    0 Votes
    9 Posts
    640 Views
    U

    @viragomann it was resolved by itself. there was an issue on the ISP-side where I get the IPs from.

  • Block SSH(22) From Wan But Allow from LAN

    5
    0 Votes
    5 Posts
    501 Views
    S

    @mathais hmm whatever I was looking at mentioned 2.7.1. I guess I posted on the wrong thread?

    Well, if you’re testing from somewhere on the Internet, and not LAN, show us your WAN rules.

  • ISP <> Fritz <> pfSense <> PS5 = NAT foo

    2
    0 Votes
    2 Posts
    380 Views
    G

    @bdk-brhl Perhaps more "gamers" over at the gaming section, but it may help if you could provide more information about your setup. Have you tried setting up UPnP for the PS5?
    How is the Fritzbox set up? Double NAT or bridge mode, if that is possible?

  • Pfsense isn't pass Internet

    2
    0 Votes
    2 Posts
    284 Views
    M

    @Mister_X-0 said in Pfsense isn't pass Internet:

    I installed pfsense and ubuntu-desktop on virtual box. now I am using from Kali-linux. After i created host adapter in vm, and connact pfsense and ubuntu to it. but ubuntu internet connection isn't work , how can i salve this probam, i am gonna use ubuntu internet by pfsense!

    Screenshot from 2024-02-24 13-22-39.png

  • Internal NAT with Nest Wifi

    7
    0 Votes
    7 Posts
    1k Views
    G

    @GoettaGrip Great that you managed to resolve it... And yes I would expect that you should be able to make things work now by using the Nest devices as dumb AP's using the LAN ports. VLAN on wifi may be nice to have but it's not a necessity.
    One way of separating things over wifi could be to set one of the Nest devices to 2.4Ghz only and place that on a separate VLAN only for your IoT devices. Then the other two can run 5Ghz only, on a different VLAN. Using different passwords will safeguard against any users accidentally connecting to the wrong wone.

    And as long as the switches are VLAN capable this would keep 2.4 and 5 Ghz separate from each other.

  • Conflict between VoIP and online gaming

    3
    0 Votes
    3 Posts
    549 Views
    snitemS

    @viragomann Thanks, I adjusted the source address and mask to match my VoIP setup and now everything works!

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.