• Alias for Source outbound NAT?

    4
    0 Votes
    4 Posts
    895 Views
    iorxI
    @furom Hi, got a similar problem here. What work: Setting a single ip/32 in my NAT -forward as source Setting the an alias which only have one entry. Doesn't work: Alias with multiple hosts or networks(/32) Also got a port alias connected to this NAT. 21, 8096,49152-50152 Can't figure out why I can't use an source alias with multiple entries on this NAT. Any suggestions?
  • 0 Votes
    1 Posts
    536 Views
    No one has replied
  • NAT and Tunnel IPsec

    5
    0 Votes
    5 Posts
    878 Views
    -
    @viragomann These scenarios don't work, but I also think that it's reloated to my config because the translated network matches an existing network. I'm going to make some adjustments to my config to try again friday. Thanks for the leads and the help.
  • Routing specific traffic to OpenVPN connection

    6
    4
    0 Votes
    6 Posts
    886 Views
    T
    @viragomann You're totally right ! The gateway was marked as down but ping to 1.1.1.1 from it works. I changed the monitor IP, the gateway goes to UP and the traffic is OK Many many thanks ;)
  • Can't get port forward to work correctly.

    31
    0 Votes
    31 Posts
    3k Views
    U
    @lolipoplo 00:00:39.893213 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 39453, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 123.139.94.40.16379: [udp sum ok] UDP, length 104 00:11:15.697052 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 41593, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 123.139.94.40.16379: [udp sum ok] UDP, length 104 01:27:00.579015 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 24615, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62214: [udp sum ok] UDP, length 104 00:00:00.296683 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 24616, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62224: [udp sum ok] UDP, length 104 00:14:59.783329 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 63138, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62214: [udp sum ok] UDP, length 104 00:04:14.623627 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 63139, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.52601: [udp sum ok] UDP, length 104 00:10:46.028208 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 21564, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.1: [udp sum ok] UDP, length 104 00:00:00.290588 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 21565, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62224: [udp sum ok] UDP, length 104 00:00:01.600105 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 21566, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62224: [udp sum ok] UDP, length 104 00:14:58.004355 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 6150, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.52601: [udp sum ok] UDP, length 104 00:00:00.162623 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 6151, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.1: [udp sum ok] UDP, length 104 00:00:00.154916 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 6152, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62386: [udp sum ok] UDP, length 104 00:00:01.225057 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 6153, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62320: [udp sum ok] UDP, length 104 00:14:58.611751 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 47222, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62320: [udp sum ok] UDP, length 104 00:00:01.804954 rule 51/0(match) [ridentifier 1000000119]: block in on em1: (tos 0x0, ttl 64, id 47223, offset 0, flags [none], proto UDP (17), length 132) 192.168.55.100.59372 > 45.190.158.201.62386: [udp sum ok] UDP, length 104 00:33:32.433578 rule 4/0(match) [ridentifier 1000000103]: block in on pppoe0: (tos 0x28, ttl 110, id 63739, offset 0, flags [none], proto TCP (6), length 52) 154.16.174.207.59372 > My-WAN-IP.54296: Flags [S], cksum 0x05da (correct), seq 3626588183, win 65142, options [mss 1287,nop,wscale 8,nop,nop,sackOK], length 0 00:00:01.010321 rule 4/0(match) [ridentifier 1000000103]: block in on pppoe0: (tos 0x28, ttl 110, id 63740, offset 0, flags [none], proto TCP (6), length 52) 154.16.174.207.59372 > My-WAN-IP.54296: Flags [S], cksum 0x05da (correct), seq 3626588183, win 65142, options [mss 1287,nop,wscale 8,nop,nop,sackOK], length 0 00:00:02.000693 rule 4/0(match) [ridentifier 1000000103]: block in on pppoe0: (tos 0x28, ttl 110, id 63741, offset 0, flags [none], proto TCP (6), length 52) 154.16.174.207.59372 > My-WAN-IP.54296: Flags [S], cksum 0x05da (correct), seq 3626588183, win 65142, options [mss 1287,nop,wscale 8,nop,nop,sackOK], length 0 00:07:20.160301 rule 4/0(match) [ridentifier 1000000103]: block in on pppoe0: (tos 0x2a,ECT(0), ttl 113, id 17567, offset 0, flags [none], proto TCP (6), length 52) 188.132.209.91.59372 > My-WAN-IP.38535: Flags [SEW], cksum 0x7a03 (correct), seq 4200447135, win 64240, options [mss 1400,nop,wscale 8,nop,nop,sackOK], length 0 00:00:06.000334 rule 4/0(match) [ridentifier 1000000103]: block in on pppoe0: (tos 0x28, ttl 113, id 17573, offset 0, flags [none], proto TCP (6), length 52) 188.132.209.91.59372 > My-WAN-IP.38535: Flags [S], cksum 0x7ac3 (correct), seq 4200447135, win 64240, options [mss 1400,nop,wscale 8,nop,nop,sackOK], length 0 This is after I left it for a whole night to run.
  • PfSense and the PS5 NAT2/NAT3 problem

    4
    0 Votes
    4 Posts
    3k Views
    M
    Changing the setting from Router to AP was key: thanks for noting it. PS5 sees NAT2 now. There was great rejoicing.
  • I can´t delete a rule sets made only for proof. Still working on.

    2
    0 Votes
    2 Posts
    626 Views
    M
    @[image: 1647199239426-8318587e-acc4-4a8c-a275-d1e5c5a684a8-image.png] This seems to be the rule that allow the connection...
  • NAT source

    11
    0 Votes
    11 Posts
    1k Views
    S
    @j-lanham You're welcome. Also after (re)installing pfB you might need to run an update to generate the aliases. I am not sure why there are two packages. I suspect the -devel started out as "beta" but then everyone started using it, and now people would have to uninstall it to install the original. -devel version 2.x existed long before 3. The author has a Patreon site at http://pfblockerng.com/ but it doesn't really explain that.
  • Issue with NAT Reflection

    1
    0 Votes
    1 Posts
    362 Views
    No one has replied
  • Port forward Mail outbound ( only outgoing )

    2
    0 Votes
    2 Posts
    589 Views
    C
    Found the solution. Go to outbound nat Source: Network 192.168.1.11/32 Destination: Any - port 25 Translation: Address: 1.1.1.8 Save and Apply
  • NAT port Forward problems

    3
    4
    0 Votes
    3 Posts
    702 Views
    F
    @viktor_g [image: 1645773433068-rules_rtk-2.jpg] NAT SDB SERVER rule works and exists The problem is in the rule NAT TOiR
  • Newbie port forwarding problem

    7
    1
    0 Votes
    7 Posts
    1k Views
    GertjanG
    @nguser6947 said in Newbie port forwarding problem: it is failing due to the default rule You say this because you've looked at the firewall logs and you saw the incoming (WAN) traffic - with the correct (8096) port and correct "protocol TCP" being flagged as 'blocked' ? I give you an example : I have a Synology Diskstation in my LAN, it has IPv4 192.168.1.33 (RFC1918 of course). I've created an alias for the device name "diskstation2", it resolves to 192.168.1.33. I want to access my Diskstation using https://diskatation2.my-domain.tld:8080 I created a NAT rule : [image: 1645717026281-3c428a1a-b625-4f10-977d-9a971db2e971-image.png] The 'destination' is the firewall macro WAN Address, as my WAN is is always part of WAN address. The day my WAN IP changes, my rule still works. I want to reach my diskskation on port 8080, so "Destination port range" is set to 8080. The traffic that comes in and matches WAN Address & port 8080 should go to : Redirect target IP : I entered the Alias "diskstation2", I could also enter "192.168.1.30". And the destination port : my diskstation web server listens on "443", it's using TLS. I Save. I have a NAT rule : [image: 1645717459343-b9a38f8a-b0c8-4b69-a812-ea43c0b161da-image.png] I checked the auto created WAN firewall rule : [image: 1645717315142-a7ab50e0-b8d0-4256-925b-404c45452f7f-image.png] I tested with my phone ( with Wifi shut down !! ) , and entered : https://diskatation2.my-domain.tld:8080 I saw the main web page of the web server of my diskstation2. I also saw : [image: 1645717384360-b995333c-91b4-438e-8378-a00fc2c2ce60-image.png] which means that the WAN rule was used / matches incoming traffic. That was me testing the access with my phone.. If needed, abuse the pfSense documentation, like Port Forwards. Port forwarding or port NATting or, more correct, PATting, hasn't changed since 1995. Every Home/business router/firewall needs the same inputs. pfSEnse seems to be diffrent but check for yourself : you have to enter 4 things, and your good. The rest of the option are 'special cases'. The day you need them, you'll know they are there. Also : I copied all the images without the need of masking something. The correct use of aliases and firewall macros make rules maintenance easy : It becomes a "set it and forget it" which means I had to look up the pfSense NAT doc, as I tend to forget things. I do not use NAT rules any more, only a VPN access which is just a firewall rule, no NAT). Exposing internal devices in a company network is a big no no (imho). This said : this is also valid for you : now your 192.168.1.250 becomes part of your network security. Keep that in mind.
  • Webserver logs shows pfsense IP instead of LAN IP

    12
    0 Votes
    12 Posts
    2k Views
    L
    @johnpoz Yes, that was what I thought, and the question initially was regarding why it was not working. But I've found the problem now. I've set it, in the general setting, but NAT Reflection was set individually on each NAT rule. So changes here had no real affect. Thanks a lot for your time.
  • GRT leaking through Pfsense

    1
    0 Votes
    1 Posts
    485 Views
    No one has replied
  • Only send certain port through VPN

    2
    0 Votes
    2 Posts
    551 Views
    V
    @rsherga In the OpenVPN client settings check "Don't pull routes" to permit the client to set the default route. Assign an interface to the vpn client instance and enable it if you didn't already. Then add a policy routing firewall rule to the internal interface. Enter the source IP or an alias for multiple if you want to specify. At destination leave the address at any and enter the destination port range. Expand the advanced options and select the VPN gateway. Put this rule to the top of the rule set so that it matches first. I assume, you your outbound NAT is already set to work with the VPN. To verify that the packets go out on the VPN interface, you can sniff the traffic using the packet capture tool on pfSense, while you try a connection to the concerned ports. To ensure that nothing goes out to WAN you can add a floating block rule for direction out with Quick checked and state the ports in regards.
  • NAT over ipsec

    6
    0 Votes
    6 Posts
    742 Views
    H
    @viragomann Thank you for the information, I did in fact have the P2 local network defined as the subnet on within the local LAN assuming the routing would have still sent the traffic across based on the destination IP and the routing table however that obviously didn't end up being the case. After changing the local network on the P2 from 192.168.1.0/24 to 0.0.0.0/0 the traffic started sending across the tunnel. Thank you for the help!
  • Cant edit port forward after upgrading to 22.01

    2
    3
    0 Votes
    2 Posts
    513 Views
    H
    @hulleyrob OK so it seems if I add a desitnation address I can save the rule however this was not the case before the upgrade.
  • Port forwarding multiple vms same application different domains

    2
    0 Votes
    2 Posts
    576 Views
    johnpozJ
    @bossey1 said in Port forwarding multiple vms same application different domains: Will HAproxy added make this harder or easier? Unless you have multiple IPs there where you have X, if you did I would of assumed .X and .Y and .Y etc. given vs all .X If you have the same public IP and you want to hit different private IPs based on the domain, really only way to do it is with HAproxy. If you only have 1 public IP being used, you have to do other ports to get forwarded to different lan side IPs. If not using a reverse proxy. But with HAproxy you can look at the fqdn trying to go to, and direct that to different backend devices.
  • NAT that does not seem to work

    1
    0 Votes
    1 Posts
    395 Views
    No one has replied
  • NAT Outbound not working between VLANs

    outbound nat
    28
    4
    0 Votes
    28 Posts
    5k Views
    I
    @johnpoz Ok, So after tons of testing I think I can say it's the GeoIP causing the issue, Not sure why, and it's not consistent 100% of the time, But when Floating rules are enabled (and the interfaces are selected in inbound and outbound) and GeoIP is enabled as Deny Inbound, the issue exist. I wasn't able to reproduce the issue when Floating Rules was disabled. Sometimes even if Floating Rules was enabled and GeoIp was enabled then it worked (for example when changing the Floating Rules from disable to enable while GeoIp was enabled, it worked sometimes and no issue existed. Only if i disabled all GeoIp, forced PfBlocker to reload all rules (under Update), Enabled GeoIp, forced reload again then the issue happened I think every time. It also seems like for me, while I live in Israel (which is part of Asia Alias), Europe GeoIp caused more for the issue to happen, even if only one country from that filter was selected. I know it's not 100% step by step on how to re-produce the bug but that's what I managed to gather so far, hope it's enough. [image: 1645089050052-3d34463f-dbd7-4149-a18d-fe9ffc806a63-image.png]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.