Ahh, I'm glad I found your posts! Coming from a Linux background I just assumed it was natural to be able to apply a nat rule to all interfaces and so thought I was totally ignorant as I tried to figure out how to make pfSense do it!
(I'm still using 2.0-RELEASE (i386) built on Wed Sep 14 00:39:34 EDT 2011 –- Is the feature I need already available?)
In any case, I agree - supporting groups for NAT, or multiple interface selection for nat, or even just an ALL interface option in nat (That should be easy if pf is anything like iptables) would be really great.
My scenario is relatively simple and normal for a small ISP:
We have several vlans bringing in customer traffic from different geographical locations, and a vlan for our server room, for example:
10.0.0.0/16: IPs for our server room - mail, web, etc.
10.1.0.0/16: East side of town
10.2.0.0/16: West side of town
10.3.0.0/16: Center of Town (You get the idea..)
Let's say the public IP is 4.4.4.4.
All vlans come into the pfSense box which then nats out through a real public IP. (Actually several real public IPs.)
So obviously some of our servers - like our main webpage and email servers - need to be reached by all users -- regardless of whether they are at home or traveling -- we configure their mail clients to connect to 4.4.4.4 (via domain name) and it should just work whether they be at home or work or anywhere in the world.
The problem is we have to add a forward rule for pop3s (port 995) not only on the WAN interface for the mail server, but also on each and every customer access vlan interface.
So if we have a web, a mail, a DNS server, a backup DNS and mail server, each with several ports listening, we could end up with having to add a lot of rules.
So yes, being able to apply a NAT rule to a group or to ALL would be a most splendid and powerful feature!
Thanks a million for a great product and keep up the good work!
~Jesse