• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Get public ip for pcs

Scheduled Pinned Locked Moved General pfSense Questions
79 Posts 3 Posters 12.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    s_serra
    last edited by Sep 13, 2021, 7:58 PM

    I bought a pfsense router to get between my isp router and my machines because the operating system of that router is very limited and with little information. My isp router assigns public ips (ipv4) through dhcp to my machines. I wish pfsense could pass these ips to the machines and each machine with a public ip. Is it possible to do that? The machine with pfsense only has 2 rj45 ports. I send the physical link that will be implemented below. Sorry for the translator's English :)

    97ce7bf1-d52c-4dc5-a536-f6271b70d497-image.png

    1 Reply Last reply Reply Quote 0
    • S
      stephenw10 Netgate Administrator
      last edited by Sep 13, 2021, 9:22 PM

      You can do that by bridging the ports on pfSense so both interfaces are in the same layer 2 segment.
      You may lose some functionality you need by doing that though. What are you using pfSense for in that scenario?

      Steve

      S 1 Reply Last reply Sep 13, 2021, 9:42 PM Reply Quote 0
      • S
        s_serra @stephenw10
        last edited by Sep 13, 2021, 9:42 PM

        @stephenw10 I wanted to use pfsense to detect the source of some ddos ​​attacks. I host game servers.

        1 Reply Last reply Reply Quote 0
        • S
          stephenw10 Netgate Administrator
          last edited by Sep 13, 2021, 9:47 PM

          Mmm, Ok you can do that in bridge mode with Snort/Suricata running.

          It can be difficult to setup with only two interfaces available as you have no separate management interface. Make sure you have console access as it's very easy top lock yourself out!

          https://docs.netgate.com/pfsense/en/latest/bridges/index.html#internal-external-bridges

          Steve

          S 2 Replies Last reply Sep 13, 2021, 9:49 PM Reply Quote 0
          • S
            s_serra @stephenw10
            last edited by s_serra Sep 13, 2021, 9:50 PM Sep 13, 2021, 9:49 PM

            @stephenw10 Is it possible to bridge only two ports in pfsense?
            I have easy access to pfsense console.

            1 Reply Last reply Reply Quote 0
            • S
              s_serra @stephenw10
              last edited by Sep 13, 2021, 9:53 PM

              @stephenw10 It is possible to see what IPS my ISP DHCP provided the machines through pfsense.

              1 Reply Last reply Reply Quote 0
              • S
                stephenw10 Netgate Administrator
                last edited by Sep 13, 2021, 10:09 PM

                I mean you can 'see' the traffic going to from them and gather the MAC/IP addresses.
                pfSense doesn't log that by default though.

                Steve

                1 Reply Last reply Reply Quote 0
                • S
                  s_serra
                  last edited by Sep 14, 2021, 9:06 AM

                  This post is deleted!
                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Sep 14, 2021, 2:01 PM

                    What I would do here is assign the bridge as an interface and put the management IP on that. Then remove the IP addresses from the interfaces in the bridge.
                    As I said though it's very easy to lock yourself out when implementing that.

                    Steve

                    S 1 Reply Last reply Sep 14, 2021, 6:20 PM Reply Quote 0
                    • S
                      s_serra @stephenw10
                      last edited by Sep 14, 2021, 6:20 PM

                      @stephenw10 I've already managed to implement. xD I was blocked several times. Hahahaha

                      S 1 Reply Last reply Sep 14, 2021, 6:44 PM Reply Quote 0
                      • S
                        stephenw10 Netgate Administrator @s_serra
                        last edited by Sep 14, 2021, 6:44 PM

                        @s_serra said in Get public ip for pcs:

                        I was blocked several times. Hahahaha

                        I know that pain! 😁

                        S 1 Reply Last reply Sep 15, 2021, 9:44 AM Reply Quote 0
                        • S
                          s_serra @stephenw10
                          last edited by s_serra Sep 15, 2021, 9:47 AM Sep 15, 2021, 9:44 AM

                          @stephenw10 I'm here with a big problem kkk. The ip addresses do not keep the ports open :( and in the firewall logs nothing appears to block the connection.

                          060e6d63-a06d-4e2c-9b88-d90e1fd59826-image.png

                          3e30408d-6869-484e-9fe2-98be64c30763-image.png

                          e8ab3d77-ba54-4dc8-a06a-fab402deb9d1-image.png

                          I have an open port 80 on a machine this machine has an apache. I've already tried to get a local ip and do nat routing and it works but with the public ip and with the firewall rules open I can't access it.

                          1 Reply Last reply Reply Quote 0
                          • S
                            s_serra
                            last edited by s_serra Sep 15, 2021, 12:08 PM Sep 15, 2021, 12:07 PM

                            503662f9-ed6d-4527-a905-8dc37536d9fd-image.png

                            In a virtual machine with public ip it works because the two machines are connected on the same bridge. But if you try to access it from the outside, i can't.

                            084f4c0e-e16f-4743-9f17-36fcee6b28c9-image.png

                            It should probably be something on the pfsense firewall but in the firewall logs nothing is blocked on port 80.

                            23e367a3-f633-4005-84e7-8d67b4df6c4b-image.png

                            1 Reply Last reply Reply Quote 0
                            • S
                              stephenw10 Netgate Administrator
                              last edited by Sep 15, 2021, 12:33 PM

                              How are those servers getting their IP? Statically configured?

                              If so the ISP is going to be ARPing for those IPs on the WAN and you should see that in a packet capture.

                              Can the servers connect out?

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • S
                                s_serra
                                last edited by s_serra Sep 15, 2021, 12:48 PM Sep 15, 2021, 12:42 PM

                                @stephenw10

                                The servers get the ips through DHCP from my ISP I created a bridge from wan to lan.
                                pfsense has a public ip public through DHCP and this already works outside the network.

                                The ips that are on the pfsense bridge does not work outside the network, only inside.

                                666429c2-3a4b-47c0-9948-af45b392b916-image.png

                                1 Reply Last reply Reply Quote 0
                                • S
                                  stephenw10 Netgate Administrator
                                  last edited by Sep 15, 2021, 1:12 PM

                                  Ok, if the servers are pulling a DHCP lease correctly then the bridge is working.

                                  Can the servers connect out to public IPs?
                                  Your pass rules are TCP/UDP only so ping will not work.

                                  Steve

                                  S 1 Reply Last reply Sep 15, 2021, 1:19 PM Reply Quote 0
                                  • S
                                    s_serra @stephenw10
                                    last edited by s_serra Sep 15, 2021, 1:22 PM Sep 15, 2021, 1:19 PM

                                    @stephenw10

                                    yes the bridge works.

                                    I already added the icmp and the ping works to connect to public servers.

                                    804b3f4e-8f90-4f66-8d84-79be245c121b-image.png

                                    the only problem is that the ports are not open to the outside of these ips on the servers.
                                    but on the firewall they are open and in the logs nothing to block appears.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      stephenw10 Netgate Administrator
                                      last edited by Sep 15, 2021, 1:25 PM

                                      Run a packet capture on the WAN for one of the server IPs. Try to connect to it. What do you see?

                                      S 1 Reply Last reply Sep 15, 2021, 1:34 PM Reply Quote 0
                                      • S
                                        s_serra @stephenw10
                                        last edited by s_serra Sep 15, 2021, 1:38 PM Sep 15, 2021, 1:34 PM

                                        @stephenw10

                                        no port

                                        13:32:29.317735 IP 79.124.62.98.8080 > 176.79.22.208.64030: tcp 0
                                        13:32:29.318082 IP 176.79.22.208.64030 > 79.124.62.98.8080: tcp 0
                                        13:32:29.701921 IP 104.211.136.118.42248 > 176.79.22.208.6379: tcp 0
                                        13:32:29.702123 IP 176.79.22.208.6379 > 104.211.136.118.42248: tcp 0
                                        13:32:30.465707 IP 79.124.62.98.8080 > 176.79.22.208.8576: tcp 0
                                        13:32:30.465943 IP 176.79.22.208.8576 > 79.124.62.98.8080: tcp 0
                                        13:32:31.388806 IP 79.124.62.74.8080 > 176.79.22.208.6321: tcp 0
                                        13:32:31.389043 IP 176.79.22.208.6321 > 79.124.62.74.8080: tcp 0
                                        13:32:33.209124 IP 79.124.62.98.8080 > 176.79.22.208.57090: tcp 0
                                        13:32:33.209345 IP 176.79.22.208.57090 > 79.124.62.98.8080: tcp 0
                                        13:32:34.526102 IP 79.124.62.98.8080 > 176.79.22.208.8337: tcp 0
                                        13:32:34.526297 IP 176.79.22.208.8337 > 79.124.62.98.8080: tcp 0
                                        13:32:34.532040 ARP, Request who-has 176.79.22.1 tell 176.79.22.208, length 46
                                        13:32:34.532922 ARP, Reply 176.79.22.1 is-at 00:03:fa:00:00:01, length 46
                                        13:32:36.055518 IP 79.124.62.74.8080 > 176.79.22.208.1340: tcp 0
                                        13:32:36.055728 IP 176.79.22.208.1340 > 79.124.62.74.8080: tcp 0
                                        13:32:37.972712 IP 79.124.62.98.8080 > 176.79.22.208.8009: tcp 0
                                        13:32:37.972919 IP 176.79.22.208.8009 > 79.124.62.98.8080: tcp 0
                                        13:32:40.439980 IP 79.124.62.98.8080 > 176.79.22.208.20049: tcp 0
                                        13:32:40.440203 IP 176.79.22.208.20049 > 79.124.62.98.8080: tcp 0
                                        13:32:43.711008 IP 162.142.125.91.63264 > 176.79.22.208.16061: tcp 0
                                        13:32:43.711217 IP 176.79.22.208.16061 > 162.142.125.91.63264: tcp 0

                                        witch port 80

                                        13:34:42.227724 IP 176.79.25.173.53915 > 176.79.22.208.80: tcp 0
                                        13:34:42.227954 IP 176.79.22.208.80 > 176.79.25.173.53915: tcp 0
                                        13:34:42.229700 IP 176.79.25.173.59211 > 176.79.22.208.80: tcp 0
                                        13:34:42.229849 IP 176.79.22.208.80 > 176.79.25.173.59211: tcp 0
                                        13:34:42.540794 IP 176.79.25.173.61377 > 176.79.22.208.80: tcp 0
                                        13:34:42.540998 IP 176.79.22.208.80 > 176.79.25.173.61377: tcp 0
                                        13:34:43.191201 IP 176.79.25.173.59211 > 176.79.22.208.80: tcp 0
                                        13:34:43.191309 IP 176.79.25.173.53915 > 176.79.22.208.80: tcp 0
                                        13:34:43.191405 IP 176.79.22.208.80 > 176.79.25.173.59211: tcp 0
                                        13:34:43.191509 IP 176.79.22.208.80 > 176.79.25.173.53915: tcp 0
                                        13:34:43.447009 IP 176.79.25.173.61377 > 176.79.22.208.80: tcp 0
                                        13:34:43.447285 IP 176.79.22.208.80 > 176.79.25.173.61377: tcp 0
                                        13:34:44.195234 IP 176.79.22.208.80 > 176.79.25.173.53915: tcp 0
                                        13:34:44.195247 IP 176.79.22.208.80 > 176.79.25.173.59211: tcp 0
                                        13:34:44.451104 IP 176.79.22.208.80 > 176.79.25.173.61377: tcp 0
                                        13:34:45.220337 IP 176.79.25.173.59211 > 176.79.22.208.80: tcp 0
                                        13:34:45.220355 IP 176.79.25.173.53915 > 176.79.22.208.80: tcp 0
                                        13:34:45.220578 IP 176.79.22.208.80 > 176.79.25.173.59211: tcp 0
                                        13:34:45.220592 IP 176.79.22.208.80 > 176.79.25.173.53915: tcp 0
                                        13:34:45.463846 IP 176.79.25.173.61377 > 176.79.22.208.80: tcp 0
                                        13:34:45.464016 IP 176.79.22.208.80 > 176.79.25.173.61377: tcp 0
                                        13:34:47.235101 IP 176.79.22.208.80 > 176.79.25.173.53915: tcp 0
                                        13:34:47.235115 IP 176.79.22.208.80 > 176.79.25.173.59211: tcp 0
                                        13:34:47.491289 IP 176.79.22.208.80 > 176.79.25.173.61377: tcp 0
                                        13:34:49.283230 IP 176.79.25.173.59211 > 176.79.22.208.80: tcp 0
                                        13:34:49.283337 IP 176.79.25.173.53915 > 176.79.22.208.80: tcp 0
                                        13:34:49.283432 IP 176.79.22.208.80 > 176.79.25.173.59211: tcp 0
                                        13:34:49.283537 IP 176.79.22.208.80 > 176.79.25.173.53915: tcp 0
                                        13:34:49.527594 IP 176.79.25.173.61377 > 176.79.22.208.80: tcp 0
                                        13:34:49.527794 IP 176.79.22.208.80 > 176.79.25.173.61377: tcp 0

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          stephenw10 Netgate Administrator
                                          last edited by Sep 15, 2021, 1:41 PM

                                          Mmm, well it sure looks like two way traffic there.

                                          That's on the pfSense WAN interface?

                                          .208 IP is the server there? What subnet mask does it have?
                                          I assume the .173 IP is not in the same subnet?

                                          Steve

                                          S 1 Reply Last reply Sep 15, 2021, 1:49 PM Reply Quote 0
                                          20 out of 79
                                          • First post
                                            20/79
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received