@nguser6947 said in Newbie port forwarding problem:
it is failing due to the default rule
You say this because you've looked at the firewall logs and you saw the incoming (WAN) traffic - with the correct (8096) port and correct "protocol TCP" being flagged as 'blocked' ?
I give you an example :
I have a Synology Diskstation in my LAN, it has IPv4 192.168.1.33 (RFC1918 of course).
I've created an alias for the device name "diskstation2", it resolves to 192.168.1.33.
I want to access my Diskstation using https://diskatation2.my-domain.tld:8080
I created a NAT rule :
[image: 1645717026281-3c428a1a-b625-4f10-977d-9a971db2e971-image.png]
The 'destination' is the firewall macro WAN Address, as my WAN is is always part of WAN address. The day my WAN IP changes, my rule still works.
I want to reach my diskskation on port 8080, so "Destination port range" is set to 8080.
The traffic that comes in and matches WAN Address & port 8080 should go to :
Redirect target IP : I entered the Alias "diskstation2", I could also enter "192.168.1.30".
And the destination port : my diskstation web server listens on "443", it's using TLS.
I Save.
I have a NAT rule :
[image: 1645717459343-b9a38f8a-b0c8-4b69-a812-ea43c0b161da-image.png]
I checked the auto created WAN firewall rule :
[image: 1645717315142-a7ab50e0-b8d0-4256-925b-404c45452f7f-image.png]
I tested with my phone ( with Wifi shut down !! ) , and entered :
https://diskatation2.my-domain.tld:8080
I saw the main web page of the web server of my diskstation2.
I also saw :
[image: 1645717384360-b995333c-91b4-438e-8378-a00fc2c2ce60-image.png]
which means that the WAN rule was used / matches incoming traffic. That was me testing the access with my phone..
If needed, abuse the pfSense documentation, like Port Forwards. Port forwarding or port NATting or, more correct, PATting, hasn't changed since 1995. Every Home/business router/firewall needs the same inputs. pfSEnse seems to be diffrent but check for yourself : you have to enter 4 things, and your good. The rest of the option are 'special cases'. The day you need them, you'll know they are there.
Also : I copied all the images without the need of masking something. The correct use of aliases and firewall macros make rules maintenance easy : It becomes a "set it and forget it" which means I had to look up the pfSense NAT doc, as I tend to forget things. I do not use NAT rules any more, only a VPN access which is just a firewall rule, no NAT). Exposing internal devices in a company network is a big no no (imho). This said : this is also valid for you : now your 192.168.1.250 becomes part of your network security. Keep that in mind.