• Using NPt seems to have a strange interaction with some LAN devices

    1
    0 Votes
    1 Posts
    194 Views
    No one has replied
  • OpenVPN NAT to IPsec

    8
    0 Votes
    8 Posts
    530 Views
    D

    @viragomann

    Okay, it doesnt work.

    My setup.

    Firewall Site A: Openvpn remote net to 192.168.123.0/24 and 172.16.0.0/24
    Firewall Site B: Openvpn local network 192.168.123.0/24 172.16.0.0/24
    On the virtual IPs Ive added every NAT IP Address as /32 for example 10.123.1.23/32
    The rules are from Site A 10.1.0.0/24 -> Site B 192.168.123.0/24 *
    Site A 10.1.0.0/24 -> Site C 172.16.0.0/24 *
    The Firewall Site B: have defined a Outgoing NAT for connections coming from 172.16.0.0/24 to 10.1.0.23 by using a NAT with the NAT IP 10.123.1.23
    And a port forwarding in the other direction.
    Thats an example setup for one site with one ip. But is that connect ?
    I cant reach the site a from site c with this setup.

  • Firewall blocking Synology MailPlus Server

    12
    0 Votes
    12 Posts
    764 Views
    S

    @aquinch

    Hello!

    Are you running the traceroute while shelled into your DS? I get flaky results running traceroute with the port option while shelled in.

    You could try a different host and run putty/telnet...

    telnet mail.synology.com 25
    telnet mail.synology.com 587
    ...

    John

  • OpenVPN or NAT?

    5
    0 Votes
    5 Posts
    322 Views
    V

    @thewho
    Glad that you it working.

  • Setting Custom NAT Protocols in newer PF versions

    2
    0 Votes
    2 Posts
    404 Views
    B

    Nevermind, I guess. Looks like no one knows.

    In the meantime I figured out a different way as workaround.... hand editing the Backup NAT and Firewall rules and using Restore.

    Just export, copy your last rule from each, paste into a new one. Change the name, blank the associated GUID ID to nothing, change protocol to ipencap, blank the port in port reference. Save. Import NAT file. Import Firewall file. No reboot needed.

    Do a tcpdump -vvv -i tunl0 on your NAT'ted AMPR gateway you're trying to expose. If you did this right and AMPR portal is already sending traffic to your public IP, your NAT should kick in and ipencap should start flowing and registering on your terminal from tcpdump immediately.

    Good luck if youre on newer PFsense.. (2.7.2) looking into running AMPR gateway, and Google brought you to this post.

    Cheers
    Byron

  • Redirect DNS

    9
    0 Votes
    9 Posts
    2k Views
    AndyRHA

    This is how I set mine up.

    https://forum.netgate.com/topic/156453/pfsense-dns-redirect-to-local-dns-server?_=1671847956280

  • Reaching destinations via another (more privileged) VLAN

    11
    0 Votes
    11 Posts
    524 Views
    L

    @heper

    Strictly seen you are right if you say that the rule order is less strict than I did suggest. If there are reasons to choose another rule order (e.g. performance), I use (partly) another order myself.

    Related to the difference in ^pfSence-rules^ and ^pf-rules^ at this moment I can only say that "pfctl -vvsr" shows that ^pfsense-rules^ are expanded to a lot more rules. Perhaps it is not as bad as I suggested in my example. No time to investigate that now.

    What ever, I am not there in the next few days. 😊
    So I will scratch my head after that break.

  • One of the interfaces setup as an additional isolated LAN not working

    8
    0 Votes
    8 Posts
    431 Views
    K

    @viragomann Thanks you it all works now. I was mistyping the ping address. It's time to go home.

  • One of the interfaces setup as an additional isolated LAN not working

    1
    0 Votes
    1 Posts
    114 Views
    No one has replied
  • SIP Packets are not hitting the firewall from the outside

    4
    0 Votes
    4 Posts
    348 Views
    M

    @SteveITS
    after disabling the landline phone from my Internet router, the packet started to come :)
    Thank you very much for the hint :)

  • IPSec DNAT not working

    47
    0 Votes
    47 Posts
    6k Views
    M

    @viragomann I have created an isolated lab for this. Slightly different ranges.

    Source site = 172.16.43.0/24
    Target site = 172.16.200.0/24
    Isolated network on target side = 172.16.210.0/24

    IPSEC Interface
    FW rules any/any on IPV4.
    Also enabled sloppy mode.
    No joy.

    4929c874-460c-4515-8f2c-aa337c71baac-image.png

    I was tinkering with Outbound NAT rules for the interfaces to be able to route between each other which led to different results on a picture capture. Not sure if any specific outbound NAT would be required here:

    48f545fb-1a9d-4de9-853c-1d6257f94cc4-image.png

    273b324f-1ed5-4c5f-9f3f-14e71c51df30-image.png

  • Port Forwarding w/ OpenVPN Tunnel - What am I doing wrong?

    35
    0 Votes
    35 Posts
    4k Views
    T

    @viragomann

    Thank you again. I assume that this also would explain why I did see some kind of traffic with the port sniffing. Apologies for the confusion, my ignorance with assuming masquerading certainly didn't help. Lesson learned!

  • Port forwarding help

    6
    0 Votes
    6 Posts
    781 Views
    Z

    @viragomann I'm using "Any" as port config for accessing the GUI via WAN. Indeed, I need to state a specific port so I can access more than one interface via WAN. Thanks for reminding me of that!

  • Port forward + P2P Service = major network issues

    2
    0 Votes
    2 Posts
    286 Views
    S

    Before anyone points this out, the rules have been turned off temporarily hence the light check marks, while testing the rules below are active.

    NAT_GENERAL.png Port_Forward_NAT_Rule.png WAN_Firewall_Rules.png

  • 0 Votes
    2 Posts
    317 Views
    D

    Apparently this is because pfSense (pf) uses Symmetric NAT. This makes hole punching impossible.

  • Zabbix Port Fowarding

    5
    1 Votes
    5 Posts
    581 Views
    JonathanLeeJ

    @esilva0608 yes anything with that subnets destination must be directed to the other routers address so it can find what you want. It’s like library it needs the location of where the books or data is. Static route but just for that subnets destination, tell it to go to that firewall, do the same on the other firewall in reverse. If they are geographically separated you will need a VPN networking between them. If you can connect the routers together with a backbone cable you just need a static route.

    Static route
    Anything requesting the other private subnet——-send to the other firewalls ip address—>

    Or you can be specific and the source could be a specific IP address only or a couple of them.

  • Mapping public IP to internal host IP for outbound traffic

    4
    0 Votes
    4 Posts
    468 Views
    V

    @fuckwit_mcbumcrumble
    You need to add the public IPs to the WAN first. Firewall > Virtual IPs
    Use type "IP Alias", select WAN interface and state the desired IP with the correct /29 mask.

    Then in the outbound NAT rule at translation address you can select this IP from the drop-down. But it should also work with the alias you've already created.

  • 0 Votes
    17 Posts
    1k Views
    V

    @johnpoz & @SteveITS , thanks for the further feedback and the address for feature requests.

    I think I'll try using a single IP address for outbound NAT for some time. With currently only around 40-50 users, that should be enough for now.

    Thank you again for the quick and good help and the many considerations and approaches!

  • pfsense wan up down shell sh

    1
    0 Votes
    1 Posts
    238 Views
    No one has replied
  • 0 Votes
    1 Posts
    242 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.