• pfSense maybe blocking Tailscale on local LAN?

    1
    0 Votes
    1 Posts
    195 Views
    No one has replied
  • Avaya ip office 5000 no audio issues

    1
    0 Votes
    1 Posts
    168 Views
    No one has replied
  • 0 Votes
    1 Posts
    141 Views
    No one has replied
  • Not able to open Odoo required ports and allow through the firewall.

    22
    0 Votes
    22 Posts
    2k Views
    johnpozJ

    @noreast-it said in Not able to open Odoo required ports and allow through the firewall.:

    a virtual IoT box running on a windows server 2019 VM in order to connect to all needed printers via ethernet.

    Well any firewall rules you need to do would be on that VM host then, not on pfsense.

    But nowhere do I see any talk of opening a port forward in your firewall allowing any ports inbound unsolicited from the internet. You clearly see the virtual iot box in their system.. Why it can't print would be on that box or their system.. Has nothing to do with firewall rules or port forwarding on pfsense.

  • Netgate 4100 and LAN1 <--> LAN2

    3
    0 Votes
    3 Posts
    248 Views
    A

    Very helpful, thank you.

  • 0 Votes
    1 Posts
    331 Views
    No one has replied
  • 0 Votes
    4 Posts
    358 Views
    johnpozJ

    @sogorman well you don't really need to do a 1:1, you could do simple port forwards for the ports you want vs all of them ;)

    So you want this fqdn to resolve to the internal IP? Just setup a host override so your local.redacted.com resolves to the 192.168.0.7

    What your seeing now is WAD, Works As Designed.

  • Slow upload with pfSense (download is ok)

    2
    0 Votes
    2 Posts
    438 Views
    B

    @paulvanduijn I have the exact same problem on two pfSense VMs running in KVM with VirtIO drivers. So far I cannot find a solution online. I tried to Disable hardware checksum offload and Disable hardware TCP segmentation offload and it did NOT work. My download speed is 500-600 Mbits but upload speed is 0.1 Mbit.

    This happens on the latest pfSense 2.7.2 and pfSense Plus 23.09.1

  • NAT, Rules, and VPN

    8
    0 Votes
    8 Posts
    429 Views
    A

    As in, Halt System. Then push the power button to turn back on.

  • Dns intercept logging

    4
    0 Votes
    4 Posts
    367 Views
    GPz1100G

    In reviewing the same concern in opnsense, it appears commits were made some 3 years back to enable this exact functionality.

    https://github.com/opnsense/core/issues/5005

    Any chance of this getting ported to pfsense?

  • NAT port forwarding to VLAN / WAN to VLAN routing issue

    1
    0 Votes
    1 Posts
    144 Views
    No one has replied
  • Added a second WAN, no way to get forwarfing NAT working on the 2nd

    20
    0 Votes
    20 Posts
    826 Views
    V

    @viragomann Thanks to your explanations, I understood and cleaned all pfSense rules and configs!
    Thanks you so much Viragomann !

  • 0 Votes
    2 Posts
    270 Views
    A

    @Anaerin
    It looks like the issue is Wireguard. Disabling Wireguard, removing it's interface, tunnel and peers removes the rules.

    Quite why Wireguard is grabbing the wrong subnet for the VPN subnet and redirecting it to the local net is an issue.

  • Portforwarding only working for 3 ports

    4
    0 Votes
    4 Posts
    360 Views
    GertjanG

    @ruqen001

    Show also the related WAN firewall rules.

  • NAT External ip vs Internal ip (Cisco vs Pfsense)

    2
    0 Votes
    2 Posts
    280 Views
    F

    @Vinibo1

    I'm going to assume your servers have already been mapped on the NAT.

    Here's my two cents beyond that:

    Your cisco set up was masking the internal IPs using "overload". This function automatically performs a port address translation and you'll have to manually input that into pfsense if you want to specify the external IP used by your servers when reaching out over the WAN.

    You can do this in firewall>NAT>outbound. Select "Manual Outbound NAT rule generation." Create a rule similar to the Cisco setup:
    Interface: WAN
    Source: 192.168.0.0/24 (DMZ network) or 192.168.1.0/24 (LAN network)
    Translation Address: Use the WAN address or specify the public IPs.

  • Weird Rules for Port Forwarding NAT

    10
    0 Votes
    10 Posts
    383 Views
    johnpozJ

    @Gertjan thanks - that damn curiosity cat was really meowing at me about this one ;) clawing at back of my brain as well - what would you want use such an alias for?? hahahha

  • Push messages from Doorbell/camera not working. Possible NAT problem

    24
    0 Votes
    24 Posts
    7k Views
    R

    Since your devices are isolated for security reasons, it could be blocking the communication needed for those alerts. You might need to tweak your firewall settings or NAT rules. If the issue persists, it could be worth exploring how systems like Vivint security system handle network segmentation while still delivering reliable push notifications.

  • DOUBLE VPN LIKE TOR

    2
    0 Votes
    2 Posts
    305 Views
    GertjanG

    @Legal_Brick_527

    With two VPN clients running on the same pfSense ?
    I didn't really insist when testing (things start to behave very bad).
    I'm sure that a first VPN client can used as the 'gateway' for a second VPN client on the same device, but you probably have to set them up the old way : manual config file creation and all that. That's not possible on pfSense.
    I hope to be wrong of course.

    What was possible :
    Setting up a pfSense VPN client to 'some' VPN-ISP, routing all outgoing traffic over this connection, that's classic and works fine.
    Then I activated a VPN client on my NAS, used 'another' VPN-ISP, and that connected also "just fine".
    Now, I had a tunnel over a tunnel.
    As I was using some web https sites to test, I actually had a a tunnel in a tunnel in a tunnel.

    Btw : you go beyond what is needed to protect the launch codes of the nukes .... are you sure you need this protection ?

  • Need Help with NAT reflection

    20
    0 Votes
    20 Posts
    880 Views
    I

    @viragomann Hi, I have new information.

    After some tests
    that I install pfsense on a VM to check if I connect to PPPoE through it and then do "CG-NAT" to the main pfsense to see if it will work.
    And it works!!!!!! The only thing I changed in the main pfsense is in the gateway group that the interface from the virtual pfsense will be the main one and all traffic will go through it!

    What it looks like is as long as the external IP address of the client trying to access is the same external address that is visible in pfsense then it just won't work.
    Now I have no idea what rule and where I should put it to solve this problem. I have never encountered this problem in my life.
    So I don't even know what to call it to google it

  • pfSense 2.7.2 port forward port 80 443 22 21 etc blocked

    15
    0 Votes
    15 Posts
    910 Views
    C

    @Gertjan I think its a checksum error that is preventing it if I disable the hardware checksum offload it work perfectly so I think that is the main cause. I did forget to mention I was on virtual and I forgot to disable the checksum in there now everything is working as it should I am sorry to cause so much confusion. Thank you again.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.