• Netgate 4100 and LAN1 <--> LAN2

    3
    0 Votes
    3 Posts
    305 Views
    A
    Very helpful, thank you.
  • 0 Votes
    1 Posts
    442 Views
    No one has replied
  • 0 Votes
    4 Posts
    430 Views
    johnpozJ
    @sogorman well you don't really need to do a 1:1, you could do simple port forwards for the ports you want vs all of them ;) So you want this fqdn to resolve to the internal IP? Just setup a host override so your local.redacted.com resolves to the 192.168.0.7 What your seeing now is WAD, Works As Designed.
  • Slow upload with pfSense (download is ok)

    2
    0 Votes
    2 Posts
    555 Views
    B
    @paulvanduijn I have the exact same problem on two pfSense VMs running in KVM with VirtIO drivers. So far I cannot find a solution online. I tried to Disable hardware checksum offload and Disable hardware TCP segmentation offload and it did NOT work. My download speed is 500-600 Mbits but upload speed is 0.1 Mbit. This happens on the latest pfSense 2.7.2 and pfSense Plus 23.09.1
  • NAT, Rules, and VPN

    8
    0 Votes
    8 Posts
    481 Views
    A
    As in, Halt System. Then push the power button to turn back on.
  • Dns intercept logging

    4
    1
    0 Votes
    4 Posts
    459 Views
    GPz1100G
    In reviewing the same concern in opnsense, it appears commits were made some 3 years back to enable this exact functionality. https://github.com/opnsense/core/issues/5005 Any chance of this getting ported to pfsense?
  • NAT port forwarding to VLAN / WAN to VLAN routing issue

    1
    0 Votes
    1 Posts
    180 Views
    No one has replied
  • Added a second WAN, no way to get forwarfing NAT working on the 2nd

    20
    0 Votes
    20 Posts
    1k Views
    V
    @viragomann Thanks to your explanations, I understood and cleaned all pfSense rules and configs! Thanks you so much Viragomann !
  • 0 Votes
    2 Posts
    374 Views
    A
    @Anaerin It looks like the issue is Wireguard. Disabling Wireguard, removing it's interface, tunnel and peers removes the rules. Quite why Wireguard is grabbing the wrong subnet for the VPN subnet and redirecting it to the local net is an issue.
  • Portforwarding only working for 3 ports

    4
    1
    0 Votes
    4 Posts
    495 Views
    GertjanG
    @ruqen001 Show also the related WAN firewall rules.
  • NAT External ip vs Internal ip (Cisco vs Pfsense)

    2
    1
    0 Votes
    2 Posts
    354 Views
    F
    @Vinibo1 I'm going to assume your servers have already been mapped on the NAT. Here's my two cents beyond that: Your cisco set up was masking the internal IPs using "overload". This function automatically performs a port address translation and you'll have to manually input that into pfsense if you want to specify the external IP used by your servers when reaching out over the WAN. You can do this in firewall>NAT>outbound. Select "Manual Outbound NAT rule generation." Create a rule similar to the Cisco setup: Interface: WAN Source: 192.168.0.0/24 (DMZ network) or 192.168.1.0/24 (LAN network) Translation Address: Use the WAN address or specify the public IPs.
  • Weird Rules for Port Forwarding NAT

    10
    0 Votes
    10 Posts
    518 Views
    johnpozJ
    @Gertjan thanks - that damn curiosity cat was really meowing at me about this one ;) clawing at back of my brain as well - what would you want use such an alias for?? hahahha
  • Push messages from Doorbell/camera not working. Possible NAT problem

    24
    0 Votes
    24 Posts
    7k Views
    R
    Since your devices are isolated for security reasons, it could be blocking the communication needed for those alerts. You might need to tweak your firewall settings or NAT rules. If the issue persists, it could be worth exploring how systems like Vivint security system handle network segmentation while still delivering reliable push notifications.
  • DOUBLE VPN LIKE TOR

    vpn gateway nat
    2
    0 Votes
    2 Posts
    504 Views
    GertjanG
    @Legal_Brick_527 With two VPN clients running on the same pfSense ? I didn't really insist when testing (things start to behave very bad). I'm sure that a first VPN client can used as the 'gateway' for a second VPN client on the same device, but you probably have to set them up the old way : manual config file creation and all that. That's not possible on pfSense. I hope to be wrong of course. What was possible : Setting up a pfSense VPN client to 'some' VPN-ISP, routing all outgoing traffic over this connection, that's classic and works fine. Then I activated a VPN client on my NAS, used 'another' VPN-ISP, and that connected also "just fine". Now, I had a tunnel over a tunnel. As I was using some web https sites to test, I actually had a a tunnel in a tunnel in a tunnel. Btw : you go beyond what is needed to protect the launch codes of the nukes .... are you sure you need this protection ?
  • Need Help with NAT reflection

    20
    2
    0 Votes
    20 Posts
    1k Views
    I
    @viragomann Hi, I have new information. After some tests that I install pfsense on a VM to check if I connect to PPPoE through it and then do "CG-NAT" to the main pfsense to see if it will work. And it works!!!!!! The only thing I changed in the main pfsense is in the gateway group that the interface from the virtual pfsense will be the main one and all traffic will go through it! What it looks like is as long as the external IP address of the client trying to access is the same external address that is visible in pfsense then it just won't work. Now I have no idea what rule and where I should put it to solve this problem. I have never encountered this problem in my life. So I don't even know what to call it to google it
  • pfSense 2.7.2 port forward port 80 443 22 21 etc blocked

    15
    0 Votes
    15 Posts
    1k Views
    C
    @Gertjan I think its a checksum error that is preventing it if I disable the hardware checksum offload it work perfectly so I think that is the main cause. I did forget to mention I was on virtual and I forgot to disable the checksum in there now everything is working as it should I am sorry to cause so much confusion. Thank you again.
  • Source URL alias not working in NAT

    1
    0 Votes
    1 Posts
    102 Views
    No one has replied
  • Created WAN NAT but still seeing Default deny rule IPv4 (1000000103)

    7
    0 Votes
    7 Posts
    459 Views
    N
    @midnightfm Good to hear the firewall side is resolved. Sounds like you'll need to dig into some Windows event logs to diagnose the barracuda LDAPS issue. I'd expect to at least see failed connection and/or authentication attempts on the DC in the event logs.
  • 0 Votes
    1 Posts
    137 Views
    No one has replied
  • 0 Votes
    5 Posts
    489 Views
    A
    i finally found the cause, i changed the 'Filter Rule association' from 'pass' to other, i then works [image: 1723103470124-c64cd004-70ad-491e-b301-eafe18d333f1-image-resized.png] but the thing is we have default gateway and even i allow all in firewall rule, but nat with filter rule association 'pass', nat still not forward the traffic; looks like it's the bug of pfsense [image: 1723103505590-3375e8e7-e1fc-4306-8f6a-80cc70841df5-image.png]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.