• Explain "Disable expansion of this entry into IPs on NAT lists"

    4
    0 Votes
    4 Posts
    714 Views
    jimpJ
    @pitchfork said in Explain "Disable expansion of this entry into IPs on NAT lists": @KOM thanks for the explanation. I think of a single use: if you add a very large subnet it could potentially crash the pfsense webserver when it ties to expand the list. That's exactly it. You can still pick the subnet itself from the drop-down, but if you add, say, a /16 you don't really want thousands and thousands of entries in the drop-down list.
  • Limit number of ports used on WAN due to CGNAT

    5
    0 Votes
    5 Posts
    432 Views
    D
    Yeah, and I imagine my IPv6 connections are in that state table too so probably a little less than half of that table is actually external IPv4 states. I figured I would mention the VPN thing to see if that made sense based on what my ISP was telling me (sounds like it does). I originally thought my issues were routing related because the ISP equipment kept responding with "Destination Unreachable" for seemingly random sites at random times.
  • NAT Inbound Does Not Create Outbound Rule

    11
    0 Votes
    11 Posts
    1k Views
    DerelictD
    @pitchfork said in NAT Inbound Does Not Create Outbound Rule: does adding virtual IPs require a pfsense or proxmox restart? No.
  • Port forwarding to the VPN IPsec tunnel

    5
    0 Votes
    5 Posts
    2k Views
    P
    @lukaszc Hi Lukaszc! How can you solve the problem over an OpenVPN?
  • NAT on Local side

    14
    0 Votes
    14 Posts
    774 Views
    M
    Ok. I will play more with it! I really appreciate your help! I'm confused because if I manually set my proxy on my machine to 10.40.162.94, it works. So I know the proxy is functional.
  • NAT Before IPSEC Issue

    1
    0 Votes
    1 Posts
    291 Views
    No one has replied
  • 1:1 NAT deleted but still in system kernel..

    5
    0 Votes
    5 Posts
    534 Views
    R
    Yessir
  • NAT rule troubleshoot

    2
    0 Votes
    2 Posts
    254 Views
    KOMK
    Create a port forward for ssh to that LAN server via Firewall - NAT - Port Forward. Since you're in private IP space, you will also need to edit your WAN config to stop it from blocking inbound access from rfc1918 addresses via Interfaces - WAN - Uncheck Block private networks and loopback addresses. https://docs.netgate.com/pfsense/en/latest/nat/forwarding-ports-with-pfsense.html https://doc.pfsense.org/index.php/Port_Forward_Troubleshooting
  • NAT a single host over IPSEC

    1
    0 Votes
    1 Posts
    212 Views
    No one has replied
  • How to use NAT over OpenVPN

    1
    0 Votes
    1 Posts
    188 Views
    No one has replied
  • PFSense used only as router allow only https

    9
    0 Votes
    9 Posts
    1k Views
    L
    First of all, thank you for your time. I tried on VMWare Forum without success, maybe people are in holidays :) If I can, I would like to recap what you wrote that for sure make it sense. What I understand is that now PFSense WAN interface is under VKernel (default Port Group: VM Network) and under its firewall. So I created a new Port Group named WAN and conenct it to Physical adapters, then move the WAN PFSense interface on it: [image: mSUZ9HX.png] Topology shown now that WAN Port Switch is connected to Physical adapter (the only one I have) [image: jkyIFO5.png] On vSwitches side I left untouched i.e. vSwitch0 (default) and vSwitch LAN. [image: TSW1jPo.png] [image: JNsyphC.png] But still doesn't work, maybe I still miss some config, or maybe I have to add/modify the VMKernel NICs section... I'm lost.... [image: F0N8nYr.png]
  • Redirect port from NAT to host of OpenVPN

    6
    0 Votes
    6 Posts
    502 Views
    V
    The routes? So you've created a Site-to-Site OpenVPN server? Also added firewall rules to allow that access? You'll need a rule on pfSense1 WAN interface as well as on the VPN interface on pfSense.
  • 1 to 1 configuration issue

    1
    0 Votes
    1 Posts
    236 Views
    No one has replied
  • IPsec + NAT Port Forward - Reply packet seems to get lost

    1
    0 Votes
    1 Posts
    186 Views
    No one has replied
  • UPNP Strange issue

    2
    0 Votes
    2 Posts
    1k Views
    N
    here are some follow up log entries. Jul 17 15:54:10 miniupnpd 85109 SoapMethod: Unknown: GetPortMappingNumberOfEntries urn:schemas-upnp-org:service:WANIPConnection:1 Jul 17 13:26:33 miniupnpd 85109 http://192.168.254.1:2189/rootDesc.xml not found, responding ERROR 404 Jul 17 13:26:33 miniupnpd 85109 http://192.168.254.1:2189/rootDesc.xml not found, responding ERROR 404 Jul 17 13:26:33 miniupnpd 85109 http://192.168.254.1:2189/rootDesc.xml not found, responding ERROR 404 Jul 16 16:49:46 miniupnpd 85109 Listening for NAT-PMP/PCP traffic on port 5351 Jul 16 16:49:46 miniupnpd 85109 no HTTP IPv6 address, disabling IPv6 Jul 16 16:49:46 miniupnpd 85109 HTTP listening on port 2189
  • Port open yet firewall still blocking traffic

    8
    0 Votes
    8 Posts
    1k Views
    johnpozJ
    @X2LR said in Port open yet firewall still blocking traffic: Yes I reset states after changes Well the client doesn't know that... So he had connection open, and wanted to continue to talk - so yeah your going too see those sorts of blocks until a new session is created. Why are you resetting the states? You would only need to do that on a specific sort of rule change for any active states related to that specific rule.. Say you wanted to block 192.168.1.100 from talking to X.. So you created a block rule, you would have to clear the states for 192.168.1.100 talking to X to make sure that rule takes effect. You don't need to clear all of them ;) So that right there explains what your seeing! You can adjust the pfsense settings so that wan going offline because monitor doesn't get an answer.. One sec and post screen of where you do that. edit: Uncheck this system / advanced / misc [image: 1563282256197-killstates.png] But yeah your going to want to setup your p2p client not to use up your whole pipe ;) Have not had to deal with any of that in many years... I don't do any p2p to my home connection.. I run a seedbox elsewhere.. But you can setup limits in the client.. And could also limit with pfsense via limiters or shaping.
  • SG-1100 changing ports on NAT

    4
    0 Votes
    4 Posts
    524 Views
    T
    @Grimson - I implemented these settings over the weekend [24/7 operation] and this clearly corrected the audio problem with the SIP trunks! THANK YOU
  • OpenVPN NAT to LAN (internal ip)

    8
    0 Votes
    8 Posts
    929 Views
    johnpozJ
    Have no freaking idea what he is doing - seems like he wants to source nat his vpn users? Just at a loss to why want to do that - just love not knowing what vpn client is connecting to your server ;) Firewall rule on the dest device? It has no gateway - or different gateway would be the only reasons I could think of wanting to source nat. If it was using a different default gateway, you could just host route on the device.
  • LAN interface performance limited to 400Mbps

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD
    As was already said (and apparently ignored) An iperf client or server running on pfSense consumes CPU cycles. If you really want to test throughput put an iperf server (known to be able to easily saturate a gigabit link) locally outside the WAN interface and an iperf client (known to be able to easily saturate a gigabit link) locally on the lan and test THROUGH pfSense, not to it or from it.
  • 10Gb NAT Throughput

    5
    0 Votes
    5 Posts
    1k Views
    T
    @chrismacmahon Thank you. That post is exactly what I was looking for. We will explore TNSR as an option. It looks very interesting.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.