Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Outbound portforward NAT response back not working on 2.5.2

    Scheduled Pinned Locked Moved NAT
    11 Posts 3 Posters 795 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @viiniit
      last edited by

      @viiniit said in Outbound portforward NAT response back not working on 2.5.2:

      I have 2 WAN connections with there individual gateway but i have disabled the default gateway in routing

      I think, pfSense will need it for its own upstream traffic routing.

      Instead i have set the gateway in the firewall like this

      Consider that these rules only affects upstream traffic, but not incoming packets.

      However, this should not cause that responds don't work.

      Ensure that the associated firewall rule is really applied to the incoming traffic.

      Do you have any floating rules?
      Or interface group rules?

      viiniitV 1 Reply Last reply Reply Quote 0
      • viiniitV
        viiniit @viragomann
        last edited by viiniit

        @viragomann said in Outbound portforward NAT response back not working on 2.5.2:

        Ensure that the associated firewall rule is really applied to the incoming traffic.

        Here is the associated firewall rule:
        Dc2frMOWkK.png

        Do you have any floating rules?
        Or interface group rules?

        No for both floating rules and interface group rules

        V 1 Reply Last reply Reply Quote 0
        • V
          viragomann @viiniit
          last edited by

          @viiniit
          On addition possible reason, I can think of:
          The PI gateway IP must be set in the PI interface settings, is it?

          viiniitV 1 Reply Last reply Reply Quote 0
          • viiniitV
            viiniit @viragomann
            last edited by

            @viragomann said in Outbound portforward NAT response back not working on 2.5.2:

            The PI gateway IP must be set in the PI interface settings, is it?

            yes in the PI interface i have set gateway to 192.168.7.1

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @viiniit
              last edited by

              @viiniit
              Hmm, it should work with that.

              For investigation, please set the WAN gateway as default and try the access again.
              If you've done all settings properly it should work as well then.

              1 Reply Last reply Reply Quote 0
              • viiniitV
                viiniit
                last edited by

                @viragomann said in Outbound portforward NAT response back not working on 2.5.2:

                For investigation, please set the WAN gateway as default and try the access again.

                when i set Default Gateway in Routing it works!

                but i didnt want to use default routing so is there no other way to make this work ?

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @viiniit
                  last edited by

                  @viiniit said in Outbound portforward NAT response back not working on 2.5.2:

                  when i set Default Gateway in Routing it works!

                  So no matter, which one you select?

                  but i didnt want to use default routing so is there no other way to make this work ?

                  As mentioned, I don't understand your intention here. The default gateway will be necessary for pfSense to access internet resources, I assume.

                  viiniitV 1 Reply Last reply Reply Quote 0
                  • viiniitV
                    viiniit @viragomann
                    last edited by

                    @viragomann said in Outbound portforward NAT response back not working on 2.5.2:

                    So no matter, which one you select?

                    yes no matter which one i choose

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @viiniit
                      last edited by

                      @viiniit
                      Okay, this behavior is new to me and it's a bug in my view, which the Netgate guys should know about.

                      Anyway, I don't see any reason for not setting a gateway as default, since the routing works properly with that.

                      @jimp
                      Obviously the reply-to doesn't work in CE 2.5.2 if the default gateway is set to "none".
                      Seems all other settings are correct like the gateway IP in the interface settings, no interface group rules, no floating rules.
                      And as the TO stated, it works properly if he selects any gateway as default, no matter which.
                      So I think this is a misbehavior, which should be corrected.

                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        There may be a bug there but running without a default gateway is a bad idea and isn't doing what you think it's doing. Setting a gateway in rules only affects traffic for hosts on the local networks matching those rules, not the firewall itself. And doing that in outbound floating rules doesn't actually help move traffic out different interfaces in most cases.

                        The firewall itself always needs to have a default gateway. If it doesn't, services on the firewall can't properly get out to check for updates, install packages, DNS may fail, VPNs can't establish, etc. Some of that can be worked around with static routes for specific remote hosts but still, it's not ideal.

                        The "none" setting for default gateway is primarily intended for situations where the default is managed by BGP or OSPF, NOT for policy routing.

                        tl;dr; There may be a quirk there but you're running an unsupported configuration so not something that would be a priority to investigate.

                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.