• 1:1Nat, two public IPs for one server with one nic

    26
    0 Votes
    26 Posts
    1k Views
    L

    Couldn't make BigBlueButton work behind pfsense/opnsense with 1:1 NAT + Reflection etc., so I gave up on that approach. I still found a solution assigning the second public IP directly to the BBB VM, which I documented here: https://serverfault.com/questions/1121061/assigned-second-public-ip-to-vm-from-outside-not-reachable/1121266#1121266

  • Port Forward to an OpenVPN client address

    6
    0 Votes
    6 Posts
    562 Views
    L

    @derelict That was it, your point 2.

    Thanks

  • Accessing hosted websites from internally

    9
    0 Votes
    9 Posts
    705 Views
    U

    @viragomann I thought about DNS queries in general, but you already answered :) Will block DoT.

    Thank you!

  • NAT Translation Breaks DNS

    6
    0 Votes
    6 Posts
    605 Views
    johnpozJ

    @dma_pf said in NAT Translation Breaks DNS:

    How to route the Localhost DNS request out the VPN interface?

    localhost would use the routing on your box.. Why would it use your isp dns? Thought you said you were resolving? And not forwarding.. There is no scenario where unbound would ask your isp dns unless you allowed those to be set via dhcp, and you were set to forward. Pfsense itself might ask them, if loopback didn't answer? Ie unbound was down/not working..

    If you want to use your vpn dns, then set your default route to go out vpn. Or forward to your vpn dns..

    I really don't get what you think having multiple connections to your vpn gets you? Do you actually have multiple wan connections?

  • Confusion on subnets and local port forwarding

    8
    0 Votes
    8 Posts
    991 Views
    johnpozJ

    @jblackburn yeah a vlan capable switch which can be very cheap and small would make a great addition to your abilities of what you can do and how easy it is to do without having to jump through odd hoops to get something to work ;)

    Would allow you to bring up any network you want on your pfsense without having to really have lots of interfaces on the pfsense device itself.. Add a AP that can also do vlans - and man you would really be cooking with gas ;)

  • possible nat bug with aliases

    3
    0 Votes
    3 Posts
    377 Views
    J

    @steveits I believe mine is set to 300 seconds, but I had let it sit for over a day.

  • Do I use NAT?

    8
    0 Votes
    8 Posts
    657 Views
    D

    @steveits @johnpoz I'm happy to say that it all worked out. I managed to get the netgate working as it is supposed to with different LAN segments. The netgate WAN port now receives a public IP which makes things a lot more simple as well. I setup WireGuard and am able to make remote connections with the peers I have configured. This thread can be closed :)

  • NAT Outbound not working

    14
    0 Votes
    14 Posts
    1k Views
    johnpozJ

    @hsv said in NAT Outbound not working:

    If I switch to "Manual Outbound NAT"

    I never really understand why anyone would do that - but yeah you can always go back to auto or hybrid mode..

    It would really have to be a specific case to not just use hybrid.. All the BS guides out there about switching to manual nat for vpn services don't make a lot of sense since hybrid works just fine for natting to your vpn interface, etc.

  • How do you simplify LAN addresses?

    4
    0 Votes
    4 Posts
    752 Views
    johnpozJ

    @sokonomi so your running sonarr - pretty sure you can change that default 8989 port. Are you running it as docker, you can also set the docker port to be something different and leave sonarr as 8989.

    As to accessing via just sonarr via some url link, you can set your box to use a search suffix so that just using host would auto do a dns query for whatever your search suffixes are, ie sonarr.yourdomain.tld

    I never get why this is of concern to so many - so what if the url is http://something.domaint.tld:port - once you create the bookmark, what does it matter just click the bookmark.

    Unless you were wanting to hand this off to users, and you feel the users are too stupid to understand putting the :port on the end of the url, or you concerned that port would not be available outbound from where they are at, etc.

    But if you provide more details of what your trying to accomplish we can go over all the different ways to skin that specific cat.

    but anything via just host name is going to be bad practice - you should always use fqdn when accessing resources.

  • Need help with (Outbound) NAT

    2
    0 Votes
    2 Posts
    298 Views
    S

    Ok, thanks to all who looked at this... got in touch with person who was more knowledgeable about the production version of this. There is NAT'ing going on, but it is not at the FW level - its being handled at the router level before the FW. So... that makes my question null/void. I will have to re-examine what I am trying to do and find another way to accomplish it.

  • pfSense+Postfix via Port Foward

    24
    0 Votes
    24 Posts
    2k Views
    V

    @t-sato said in pfSense+Postfix via Port Foward:

    One interesting thing is I had to select NAT reflect type NAT+Proxy on the mail server related port forward to access from other net. Pure NAT did not work from other LAN interfaces.

    This does masquerading again, but it is only applied to traffic from inside your network.

    NAT reflection helps you to access your inside service by requesting its public IP.
    To avoid the need of NAT reflection, we add host overrides to the internal DNS (maybe DNS resolver on pfSense) and point it to the internal IP of the service.

    But nice, that you got sorted the outside access without masquerading.

  • Pure Nat + CARP + multi wan

    5
    0 Votes
    5 Posts
    549 Views
    kiokomanK

    @viragomann

    [root@centralino ~]# route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.16.3 0.0.0.0 UG 0 0 0 eth0 169.254.0.0 0.0.0.0 255.255.0.0 U 1002 0 0 eth0 192.168.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 [root@centralino ~]# ip address 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether 00:0c:29:0d:d2:c0 brd ff:ff:ff:ff:ff:ff inet 192.168.16.176/24 brd 192.168.16.255 scope global dynamic eth0 valid_lft 4759sec preferred_lft 4759sec inet6 fe80::20c:29ff:fe0d:d2c0/64 scope link valid_lft forever preferred_lft forever

    192.168.16.1 pfsense1
    192.168.16.2 pfsense2
    192.168.16.3 carp

    91f41c82-520f-4a86-872a-b66361ff8505-image.png

  • Can I Use VPN To Expose Service Through Double NAT

    9
    0 Votes
    9 Posts
    2k Views
    Bob.DigB

    @bjd223 said in Can I Use VPN To Expose Service Through Double NAT:

    I guess if you could route only the Emby traffic/machine over the VPN that would be more ideal I am just not familiar if you can do that on pfSense.

    But you asked in the pfSens forum so... and yes, it is possible.

  • New T-Mobile 5G Cellular Modem Configuration Advice

    1
    0 Votes
    1 Posts
    307 Views
    No one has replied
  • Perhaps I'm double NATing?

    12
    0 Votes
    12 Posts
    814 Views
    johnpozJ

    @mvmatch see my edit of last post with a little drawing - maybe that will help you understand that ISP can use internal rfc1918 space without a nat..

  • Port forwarding from WAN to LAN on Pfsense ESXI not working

    20
    0 Votes
    20 Posts
    1k Views
    J

    @gulzoa712 That's what your NAT rule does.
    Any source, meaning the internet, on port 80 goes to your internal address of 192.168.15.213 on port 80.

  • PFsense NAT from Site A to webserver Site B

    4
    0 Votes
    4 Posts
    562 Views
    johnpozJ

    @belalalali well that would come down most likely to what you resolve the fqdn of this webserver your trying to access.

    If you resolve host.domain.tld to the IP that is accessible via the tunnel - then yes the traffic would go down the tunnel.

    If you resolve host.domain.tld to the public IP then the traffic would go out via your normal internet connection.

  • More NAT help/seeking knowledge

    10
    0 Votes
    10 Posts
    847 Views
    johnpozJ

    @sbrews said in More NAT help/seeking knowledge:

    it has to be done this way.

    Company Politics/Polices and optimal networking rarely see eye to eye ;) heheh

  • Need help with NAT

    6
    0 Votes
    6 Posts
    619 Views
    S

    For those replied /tried to help/point me in the right direction - thank you.

    Going to have to put this on the back burner as I have been banging on this for a couple weeks now with no progress. The network people at my 4 letter place are not familiar with pfsense... and are busy with other things.

    This is/was a pet project for me - trying to duplicate a piece of our physical environment in virtual box so I can test/experiment with things without impact on the physical environment.

  • OPENVPN NAT CONNECT A DB PORT

    7
    0 Votes
    7 Posts
    694 Views
    dotdashD

    @rafaelvilelacosta94
    Again, 40.x and 50.x are not private ranges. Moving on from that, you would do something like this for your openvpn rules-
    action/proto/src/srcport/dest/destport
    pass * 40.40.20.0/24 * 192.168.42.xy z
    block * 40.40.20.0/24 * * *
    pass * 50.50.10.0/24 * LAN subnet *
    etc...
    with xy being the ip of the server and z being the port(s) they need to access.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.