@Derelict:
Outbound NAT on the LAN interface will accomplish that.
Firewall > NAT, Outbound - Switch to Hybrid outbound NAT
Add a rule:
Interface: LAN
Source: 212.0.1.2/32
Destination: 192.168.0.10/32
NAT address: Interface address
This is working flawlessly (the log also says so). Thank you for bringing me a better understanding of PFSense.
(ofcourse the source, 212.0.1.2 is set on "any")
There is another use case for this such setup.
On my Windows Server (It could also have been CentOS, s specific NVR runs on Windows only), I have running a VPN Client (OpenVPN) towards a VPN service. Default Gateway is set to the VPN Service by OpenVPN (that is actually perfect). Having running services on the Server (NVR), it would not be accessible anymore from the Internet via PFSense without the Outbound NAT solution on the LAN interface. Because Local LAN traffic is never routed to a Default gateway, in this case the Gateway of the VPN service ;)
What kind of traffic has to go over the VPN? That is up to you :)
edit: for other readers, you still have to configure NAT by using the "Port Forward" method + adding the outbound configuration.
edit: why not, a drawing
Drawing2.jpg_thumb
Drawing2.jpg
Drawing1.jpg
Drawing1.jpg_thumb