• [Solved] Forwarding port 80 with redirect to 81 opens only 81 on WAN

    6
    0 Votes
    6 Posts
    2k Views
    S

    @truetype
    I'm wandering on by here but if you simply redirect port publicip:80 to privateip:443 using NAT that doesn't do a redirect, that would cause an error since the web browser and web server are using two different forms of communication. Let the connection to 80 work and have the web server redirect to https:// so the browser knows to talk https.

  • Redirect to FQDN without port

    3
    0 Votes
    3 Posts
    580 Views
    DerelictD

    If it is only that one FQDN, just set port 80 on the outside of the port forward and 8000 on the inside.

    0_1527631920572_Screen Shot 2018-05-29 at 3.11.32 PM.png

  • Post-routing DNAT -- Is it possible on pfSense?

    1
    0 Votes
    1 Posts
    543 Views
    No one has replied
  • Hosts on the same network cannot communicate using their public IPs

    4
    0 Votes
    4 Posts
    728 Views
    K

    Thank you for the link. Seems that I had forgotten to set "Enable automatic outbound NAT for Reflection". After setting this, servers were able to communicate with nodes on the same VLAN

  • VLAN: 1 Managed Switch port connected to unmanaged switch

    21
    0 Votes
    21 Posts
    3k Views
    M

    So I got the Managed Switch and now I have several VLANs:

    VL10_MGMT VL20_SEC - this is were main clients will connect (mostly via WIFI) and it'll use a VPN_WAN gateway. VL30_CLR - sort of a DMZ where I connected all LAN devices (Freenas and its jails, Receiver, TV, AppleTV, etc) VL40_GUEST - WIFI network only for... guests VL50_IOT - where I'll connect several IoT devices via WIFI (smart lamps, dimmers, climate, etc)

    Makes sense?

  • Multi WAN Port Forward Issue

    1
    0 Votes
    1 Posts
    375 Views
    No one has replied
  • Multi-WAN and Multi-LAN Outbound NAT

    4
    0 Votes
    4 Posts
    2k Views
    A

    Why you need manual NAT?
    You can just select the desired gateway in each lan rules!
    It's under advanced when editing a rule.

  • Port forward for both LAN and WAN in one rule

    3
    0 Votes
    3 Posts
    496 Views
    M

    it works! Thanks anyway.

  • Trunk 3 Nics to 3 Nics No switch

    5
    0 Votes
    5 Posts
    541 Views
    stephenw10S

    Yes, you can setup a LAGG between the firewall and client directly. Or between two firewalls for that matter.

    Steve

  • 1:1 NAT cease to work after some time

    2
    0 Votes
    2 Posts
    448 Views
    C

    Hi,
    Further informations to this phenomene:

    The PFSense runs virtualized on XEN Hosts. After a live-migration of the VM while packets are dropped, everythings works again. We have another PFSense in a completely different setup with similar problems concerning 1:1 natted Systems running on VMWare ESX. On ths system my colleague implemented a cronjob which regularly resaves the WAN-Interface to prevent this phenomene ;-/

    Cheers
          Ulli

  • No internet on OPT1

    12
    0 Votes
    12 Posts
    8k Views
    S

    Ok thanks

  • Using L3 switch As gateway

    2
    0 Votes
    2 Posts
    491 Views
    DerelictD

    Like this:

    pfSense-Layer-3-Switch.png
    pfSense-Layer-3-Switch.png_thumb

  • NAT - source and destination share IP address block

    14
    0 Votes
    14 Posts
    1k Views
    johnpozJ

    Oh no Derelict I can see a feature request coming to add the magic "unfrack this fracked network design" checkbox.

    You think we could get that setup for say 2.6? ;) heheheheh

  • UPnP not allowing multiple PS4s.

    14
    0 Votes
    14 Posts
    4k Views
    T

    Hello,

    I Have the same issues with 2 Xbox One.
    The NAT is open for Xbox Live, but not possible to join a session in warframe (no probleme with rocket league).

    https://forums.warframe.com/topic/949122-no-coop-for-2-xbox-same-isp/

  • Incoming traffic to 1:1 NAT targets get's confused once in a great while

    3
    0 Votes
    3 Posts
    746 Views
    R

    Jim,
    I am so sorry - I missed your response on this. I know it's been six months, but the problem reared it's head again.

    If I understand correctly, you are saying that the combination of NAT port forwarding and 1:1 NAT to my virtual IP's assigned to the CIDR block "could" be causing the issue when you say this "… if something happened to the port forward then it may misbehave.".

    It's a weird too as often getting the remote user to clear their browser cache causes the problem to go away - but other times it takes a day.

    We had been using NAT port forwarding in conjunction with 1:1 NAT to try and conserve our static IP's  - but it sounds like it might be safer to just do the 1:1 NAT and not port forwards.

    Is there any way to further pin this down? I have correlated Chrome browser network requests, with pfSense firewall logs and the request logs on the two web servers involved.  I can pretty clearly see where the first six requests from the browser are all to the IP address of the first web server, but pfSense shows the sixth request gets NATed to a different server - but of course no rationale for why it did that.

    UPDATE: Yes we are also using aliases a good bit. What type of issues might that cause?

    Thank you again - Richard

  • Port Fowards are not working

    9
    0 Votes
    9 Posts
    847 Views
    DerelictD

    Note you don't strictly NEED a VIP if the traffic for those addresses is routed to the WAN interface. All that matters is the traffic arrives. If so, NAT will happen.

    If it is an address in the WAN subnet (or some silly, unrouted, secondary WAN subnet) then you must have something that will respond to ARP from upstream in place on WAN, meaning one of the VIP types except Other.

  • LAN > NAT to WAN gateway IP > routed IP subnet. What have I missed?

    1
    0 Votes
    1 Posts
    366 Views
    No one has replied
  • Port forwarding for SMTP outgoing ?

    7
    0 Votes
    7 Posts
    1k Views
    DerelictD

    Perhaps. But firewall rules blocking everything but SMTP are far, far easier.

    Either way it looks like you want this behavior on whatever Lan2/Router are in your "diagram" and not on pfSense.

  • Port forwarding into remote VPN Network

    6
    0 Votes
    6 Posts
    5k Views
    DerelictD

    Because the OpenVPN tab is really an interface group consisting of all OpenVPN servers and clients on the firewall. Traffic passed by rules on an interface group tab cannot be flagged with reply-to because pf does not know which interface the traffic arrived on (it could be any interface in the group).

    The firewall processes interface group rules before interface rules so the traffic must not match any rules on the group because there will be no reply-to so replies don't get directed back out the way they came in but are instead routed according to the routing table. When dealing with connections from arbitrary internet sources, this usually means they go out to the default gateway. There would be no matching state on that interface so that traffic is usually dropped. Even if it wasn't dropped and made it back to the originating host, the firewall there would probably drop the traffic because it would be sourced from a different IP address than the connection was originated to.

  • Outbound NAT - Greyed out - Not working

    4
    0 Votes
    4 Posts
    1k Views
    DerelictD

    Most people enter Hybrid mode then create the rule and just leave it in Hybrid mode.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.