• Outbound IP from 127.0.0.1

    4
    0 Votes
    4 Posts
    2k Views
    jimpJ
    It will show that in the log, but the state table should show it getting NAT applied. Still, a NAT rule like that with a source of any is an awful idea. Match the traffic more precisely (source = your WAN IP address, destination = any, port 69) Though TFTP is a mess of a protocol, it'll still probably need some other nonsense to make it work.
  • NAT Duplication?

    3
    0 Votes
    3 Posts
    1k Views
    M
    Hi CMB, Thanks for the reply. I have already tried the NAT without the rule, with no success. Perhaps something with the ProxyARP IP address. It does seem to work OK directly on the WAN ip address
  • NO NAT DMZ not working when NO NAT is configured

    3
    0 Votes
    3 Posts
    1k Views
    C
    Hi cmb, Thank you for your reply. My ISP had provided me with the WAN IP and /28 which is supposed to be routed as you said …. I'll follow up with them. Regards.
  • Help: NAT Rule from Vmware Server to Real LAN server ?

    7
    0 Votes
    7 Posts
    1k Views
    johnpozJ
    huh??  If you want pfsense wan to have internet it needs to point at the gateway that gives it internet.
  • Outbound NAT and LAN internet access

    7
    0 Votes
    7 Posts
    5k Views
    T
    Brilliant! I removed the 2 NAT rules I added earlier, and added a new rule for the WAN interface, with the source as the /26 network, and selected No NAT.  I switched it over to hybrid, and made sure the server was still online and that NAT was disabled for it (using a cURL command to send a request to a public IP return service).  My backup LAN device still wasn't able to get out, but I looked down at the automatic rules and noticed that even though they included the LAN network in the source (all interface networks, actually), they were set for only the WAN interface.  I created a new rule on the LAN interface with the LAN network as the source, and selected Interface Address for the translation address.  Now the LAN device can get out on the main IP and the public routed subnet works fine also. Thanks, this was helpful.
  • Difference between 1:1 with a FW rule and port forwaring

    2
    0 Votes
    2 Posts
    691 Views
    K
    Packet filtering and address rewriting are two separate processes in PF. Regardless of the address rewrite method you have to allow access with packet filter rules and the filter rules will be identical in both 1:1 and port forward NAT cases assuming that the goals are the same in both cases when it comes to access.
  • SIP One Way Audio

    2
    0 Votes
    2 Posts
    1k Views
    chpalmerC
    Quick note-  If you really are using 172.0.0.1 as your LAN you shouldn't be-  Unless your using AT&T uverse and have public IP addresses on your stuff. Private space starts at 172.16.0.0 Lookup Result for 172.0.0.1 | IP Address: | 172.0.0.1 | | Host of this IP: | 172-0-0-1.lightspeed.brhmal.sbcglobal.net | | Organization: | AT&T U-verse | | ISP/Hosting: | AT&T U-verse |
  • Help Needed: Possible NAT/Firewall Issue - VoIP Registration over VPN

    3
    0 Votes
    3 Posts
    2k Views
    0
    Thank you! It is incredibly helpful getting re-pointed when feeling stuck in the middle of a problem. And overlooking what should have been an obvious cause. (Trees for the woods etc).  :) Confirmed packets were going to PBX and I had completely missed the integrated firewall. Silly mistake, but hopefully this may help another. Thanks Again.
  • Security problem after unstable NAT

    7
    0 Votes
    7 Posts
    2k Views
    P
    Ok, you're right. I will keep them in one topic for future problems. I don't think I can merge them myself. Any idea how I can solve the NAT problem?
  • NAt to server

    5
    0 Votes
    5 Posts
    4k Views
    C
    @boss_001: If i want to use vip, what type do i use and how do i make roules in the firewall and/or outgooing NAT? Type  ? IP Alias, CARP, Proxy ARP or Other? Depends on your situation. Usually IP alias. https://doc.pfsense.org/index.php/What_are_Virtual_IP_Addresses
  • [RESOLVED] Network mapping like netmap iptables extension possible ?

    2
    0 Votes
    2 Posts
    3k Views
    G
    Found the solution in this topic : https://forum.pfsense.org/index.php?topic=43507.msg225529;topicseen#msg225529
  • Translating iptables -> pfsense

    3
    0 Votes
    3 Posts
    1k Views
    G
    Found the solution in this topic : https://forum.pfsense.org/index.php?topic=43507.msg225529;topicseen#msg225529
  • Port Foward 80/443 to Web Server/DMZ Issue

    8
    0 Votes
    8 Posts
    2k Views
    V
    So the packets don't reach your WAN interface obviously and it will not be a pfSense issue.
  • Forwarding ports from WAN interface to LAN interface

    4
    0 Votes
    4 Posts
    3k Views
    J
    You were both right on the money and after disabling the default rfc1918 rule I'm up and running.  Thanks!
  • Help with NAT/DMZ (Version 2.3.1)

    1
    0 Votes
    1 Posts
    948 Views
    No one has replied
  • NAT Issues - Elastix

    2
    0 Votes
    2 Posts
    2k Views
    R
    This was a Elastix issue and not related to pfSense. Mods can close/delete thread.
  • Need help forward Plex and ownCloud hosted in a Freenas server

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD
    That list covers just about everything it could be. You'll probably have to start looking at packet captures to see where you went wrong.
  • VirtualBox internal network port forwarding ssh access to quest from host

    4
    0 Votes
    4 Posts
    2k Views
    johnpozJ
    your dest shoudl be 22.. Agreed you don't know what port the traffic will come form.. But you do know it will be going to 22..
  • Single web server behind PFSense box.

    3
    0 Votes
    3 Posts
    2k Views
    J
    @johnpoz: All you need to do for this is simple port forward, clickity clickity done..  It will auto create the firewall rule for you - the only thing you might have to do is move the rule up the wan list if you had something that would block it. Forward your ports 80 and 443 to whatever IP 192.168.1.25 Then test from outside.  If no work then check the troubleshooting doc https://doc.pfsense.org/index.php/Port_Forward_Troubleshooting And by that, do you mean create the PF under the NAT Tab? If so, I already tried that and had no luck. Is there anything that I need to setup extra on my IIS Server? EDIT: Added screen shot of Port Forward rule: https://postimg.org/image/wbsh0fs3r/
  • HOW TO NAT 1:1, BUT SERVER DO NOT POINT TO PFSENSE'S GATEWAY?

    3
    0 Votes
    3 Posts
    2k Views
    A
    Thank admin, This is my config, IT's WORK ! Steps: #1/ FIREWALL->NAT 1:1 [image: 838964524c9f49adafe47126a298492c.png] #2/ FIREWALL->NAT OUTBOUND: [image: fb4ebdad5da141a786e10838329e6c9d.png] [image: 81c80cd831e84a14a379e862fbdffd60.png] #3/ FIREWALL->RULES->WAN: [image: 18f97722b9ff45a48d8ab0af00689c95.png]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.