• 0 Votes
    7 Posts
    2k Views
    D

    I ended up just using the Host Overrides in DNS Forwarder as my split DNS solution since none of the other solutions seemed to work. From what I understand it's using a dnsmasq backend and likely just adding the entries to /etc/hosts

  • Outbound Address Redirect from WAN

    1
    0 Votes
    1 Posts
    578 Views
    No one has replied
  • NAT through OPENVPN Tunnel

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ

    To get the behavior you want with OpenVPN, where reply-to sends the packets back the way they came in, you'll need to do the following (on the receiving side):

    1. Assign/enable the OpenVPN interface from Interfaces > (assign). Set it to an IP type of 'none'
    2. Restart the VPN (edit/save)
    3. Move firewall rules from the OpenVPN tab to the new interface tab. No rules on the OpenVPN tab can match the traffic.

  • One WAN two LAN

    10
    0 Votes
    10 Posts
    2k Views
    E

    @Aksa0110:

    …everything is up and running now...

    dotdash you were right... wan and LAN on the same subnet = bad idea, i had to learn it the hard way, i have changed the LAN subnet and everything worked instantly

    thank you for @eyeopener@

    Yep. I'm a little late in the game on this one, but you definitely want all of your interfaces on a router to be on separate subnets. Good work figuring that out.

  • 1:1 NAT - Works only after Virtual IP addr assignment?

    2
    0 Votes
    2 Posts
    1k Views
    S

    I'm assuming your WAN looks like a single block of IPs (/27 for example) rather than a routed WAN (/27 routed to a /30 on the WAN interface, for example).  I had the same confusion when I first switched to pfSense.

    The reason you have to do a virtual IP is that the IP interfaces are separate from the Firewall (NAT/Rules/etc) at the OS level.

    Also, having the 1:1 NATs on Virtual IPs allows you to do things like use CARP for failover between two boxes.

  • 1 WAN share with Multi LAN (different subnet) + DMZ

    20
    0 Votes
    20 Posts
    38k Views
    W

    Which is my point about a hostile lan, if you consider it hostile - then sure run host based firewalls.  But you have to freaking configure them to do any sort of good.  And again why would you have 2??  If you not going to actually configure them - they are not going to do anything for you but cause headache and grief and more administration.  If you were configuring them you would of known hey - I want machines from source X to talk to my workstations have to edit the firewall configs to allow that.

    Hi John,

    Thank you for your input here. :D

    I do appreciate your your time and effort in giving out advice. ;D

    But would it be possible to type out your information is small
    little bite size chunks, so that I can digest it quickly. :)

    Ok, back to what I want to say…..

    Yes, I know, one of my PCs from the hostile LAN was shifted to the
    OPT2VIANIC network for testing internet connection.

    So that PC used for testing has got a software firewall loaded.
    That is why there is so much grief happened to me.

    Yes, I know it would a lot of administration job to configure,
    if PC has software firewall loaded on.

    Basically, you are saying at any PC living at the OPT2VIANIC network can turn
    off software firewall totally. Because it is cause a lot of problem since you have
    pfSense firewall rule guarding the interface, and then you have another
    software firewall guarding in Windows interface.

  • Exchange Behind PFSense

    5
    0 Votes
    5 Posts
    4k Views
    dotdashD

    Either put everything off the LAN or change the subnet on the OPT. The way you have it setup now is going to cause problems.

  • LAN (external subnet) NAT issue?

    2
    0 Votes
    2 Posts
    717 Views
    C

    OK I figured it out by enabling manual NAT and natting the bad internal network;

    I don't recall having to do this for the same setup with "correct" lan subnets.

    Hope this helps,

  • Help Please- Probleme with port forwarding

    3
    0 Votes
    3 Posts
    804 Views
    johnpozJ

    Did you allow it to auto create your wan rule?  This seems to be common mistake, users change the default to not create that wan rule automatically.  And then never create the rule by hand or create it wrong.

    Next common is issue is double nat, and that traffic never gets to pfsense wan to be forwarded on because user doesn't setup the forward or dmz for pfsense wan in the device in front of pfsense doing nat.

    I believe both of these are mentioned in the troubleshooting doc, if not I will edit to include ;)

    edit:
    Both of those are clearly mentioned in items 1 and 8.

  • Forward range of ports to a single port

    12
    0 Votes
    12 Posts
    3k Views
    N

    Got it… Sorry, I misinterpreted what you were getting at.
    That's why I run both as UDP is preferred, but you have that fallback  ;)

  • Exchange Server 2013 behind PFSense

    5
    0 Votes
    5 Posts
    3k Views
    V

    If you can access OWA externally and you set up DNS internally for BOTH autodiscover and the hostname of the mailserver (e.g. mail.youdomain.com and autodiscover.yourdomain.com) and pointed them at the private IP and not the public IP then something is wrong with your exchange server settings. Research how to configure autodiscover or ask your questions on a MS forum as keyser suggests.

  • Cannot get it right: mixing AON with 1:1 mappings

    1
    0 Votes
    1 Posts
    622 Views
    No one has replied
  • Is using Public IP addresses behind a NAT router LEGAL?

    11
    0 Votes
    11 Posts
    7k Views
    jimpJ

    @pfSensible:

    But if they know my IP address and my MAC ID isn't this enough to be able to route the traffic back?

    No. If the IP is not theirs, they wouldn't have routes for it from the Internet at-large. It wouldn't trust the IP on the packet more than its own (or its upstream's) routing information (BGP, tables, etc). They couldn't deliver it back to you unless you also had a subnet in common with them (e.g. and IP in the same subnet as one of their gateways) and even then, since it's not one of their IP addresses, they wouldn't route it back to you anyhow.

    As fragile as the Internet really is, it's not that fragile, or things would be a lot more broken than they already are…

  • Port Forwarding Issue

    4
    0 Votes
    4 Posts
    839 Views
    V

    Basically there is no need to use NAT for webconfigurator, however you can use it to forward access on WAN to LAN interface.
    Have you put the appropriate rule on the top of rule set of WAN or LAN, whatever you will use, to ensure no other rule is blocking the packets?

    For troubleshooting enable logging of pf rules and also enable logging of firewall default blocks in System Logs settings. So you can see in System Logs which rule is blocking the access.

  • 0 Votes
    1 Posts
    802 Views
    No one has replied
  • Port Forwarding problem with Kloxo web server !

    4
    0 Votes
    4 Posts
    914 Views
    C

    The hostname isn't properly configured in your Kloxo server. The screenshot you posted tells the probable causes. Lots of references out there that undoubtedly have some solutions.
    http://lmgtfy.com/?q=%22domain+is+pointing+to+the+wrong+kloxo+server%22

  • WAN to local IP's

    6
    0 Votes
    6 Posts
    2k Views
    P

    The default gateway of public asterix server is going to be the ISP gateway. So you will need to add a static route on public asterix server to tell it that 192.168.1.0/24 is reached through pfSense WAN IP 20.20.1.200
    Then have pass rule/s on pfSense WAN to allow traffic source 20.20.1.201 destination 192.168.1.n (the server/s you want to allow it to access) port as needed.

  • Outbound NAT issues with VLAN

    7
    0 Votes
    7 Posts
    1k Views
    P

    Your firewall rule is only allowing TCP. That will mean that DNS requests from clients (UDP) are being blocked. Clients will not be able to resolve DNS. You can probably ping 8.8.8.8, but not ping by name.

  • Inbound NAT Broadcast

    3
    0 Votes
    3 Posts
    1k Views
    V

    I use the WOL tool integrated in pfSense.
    Services > Wake On LAN

    If applicable you can apply a special user for that and give solely the appropriate permission to him in user manager.

  • Outbound NAT weirdness with 127.0.0.0/8 addresses.

    6
    0 Votes
    6 Posts
    2k Views
    jimpJ

    Yep. And for reasons like that, it's easier to keep the 127.0.0.0/8 NAT rule in place by default.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.