@mrjoli021 said in Port 53 being blocked:
I am using one of the DMZ ip's to get natted out to the internet.
IPv4 : NAT is useful so devices present in your DMZ can get contacted FROM the Internet.
Devices in the DMZ can go out to the Internet at will, only restricted by firewall fules on the DMZ interface.
@mrjoli021 said in Port 53 being blocked:
I am not able to resolve any DNS names. not sure why. I have created NAT rules manually and selected the virtual IP as the source IP and ip based I have internet access, but cant resolve anything. Looking at the firewall rules, I am seeing port 53 blocked from my DMZ IP.
Why do you block 53 (UDP and TCP) traffic with firewall rules ??
Look again the IP's used, and check against your rules.
@mrjoli021 said in Port 53 being blocked:
but cant resolve anything.
What is the IP of the DNS used by devices on your DMZ ?
( Windows => ipconfig /all )
Is traffic allowed to that IP ?
If it is the resolver running on pfSense, is it listening go "All" incoming interfaces, or is the "DMZ" listed in the "Network Interfaces" list ?
If your are using the resolver, and you are using the ACL list, check again the ACL's attributed.
Btw : You started pfSense the first time, you only had a LAN interface.
You created other interfaces, like OPT, OPT2 - or, why not, you named it "DMZ".
Make sure unbound (resolver) is listing on that interface.
Make sure a DHCP is setup to deal out IP's on the interface.
Use temporarily the rule you found on LAN (that one works) - just adapt the "Soure IP" info as this is another network.
Done : your OPT, OPT2 - or, why not, you named it "DMZ" - works..
NAT rules created afterwards, if, and only if devices present on DMZ need to be contacted by devices from the outside world, the Internet.