Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Outbound NAT - lose connectivity

    Scheduled Pinned Locked Moved General pfSense Questions
    15 Posts 6 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @michmoor
      last edited by

      @michmoor said in Outbound NAT - lose connectivity:

      So i have a requirement to NAT connections when coming into my DMZ to a DMZ address. So if the DMZ network is 192.168.15.0/24 then I need to NAT to something in that range. So i created an alias of 192.168.15.200.

      These statements are conflicting. The "DMZ address" is not anything in the DMZ range. It's the interface address of pfSense.

      Why do you need to translate the source address at all?

      I went into my outbound NAT policy and selectd the translation address of the alias. This breaks all connectivity. Cant ping or access resource in the DMZ from other vlans that are directly connected to the firewall.

      That's expected.
      If you translate the source address, the destination device will try to respond to this one. If the address is not assigned to the pfSense DMZ interface responses will never come back to the source device.

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @viragomann
        last edited by

        @viragomann The statements arent conflicting. This is achievable on an ASA.
        The requirement is that DMZ machines should only see local addresses in their subnet and not see anything outside.
        Because the NAT is assigned to the firewall, the firewall should be able to do either a Gratuitous ARP or respond to an ARP message for that NAT within the vlan.

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        V 1 Reply Last reply Reply Quote 0
        • V
          viragomann @michmoor
          last edited by

          @michmoor said in Outbound NAT - lose connectivity:

          The requirement is that DMZ machines should only see local addresses in their subnet and not see anything outside.

          Seeing the origin source IP on the destination device is desired in most cases. But I think, you will have good reasons for masquerading the packets.

          Because the NAT is assigned to the firewall, the firewall should be able to do either a Gratuitous ARP or respond to an ARP message for that NAT within the vlan.

          If the IP is assigned to the pfSense DMZ interface this should work though.
          However, I'm wondering, why you state an alias then. In this case you can select the address directly from the translation address drop-down.

          So possibly you did something wrong. But without getting more details I cannot verify.

          M 1 Reply Last reply Reply Quote 1
          • M
            michmoor LAYER 8 Rebel Alliance @viragomann
            last edited by

            @viragomann The documentation states to use an Alias

            0264ae36-a077-4a11-9caf-549a3548936f-image.png

            I should be able to pick any free IP in the range and use it but so far what works is using the Interface IP on the firewall.

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            S V DerelictD 3 Replies Last reply Reply Quote 0
            • S
              SteveITS Galactic Empire @michmoor
              last edited by

              @michmoor said in Outbound NAT - lose connectivity:

              so far what works is using the Interface IP on the firewall

              pfSense has to have the address, to receive the reply packets. Just like using NAT on WAN, the Internet replies to the WAN IP and pfSense translates that to the LAN IP.

              Did you try adding your custom IP to the interface as a virtual IP?

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote 👍 helpful posts!

              1 Reply Last reply Reply Quote 0
              • V
                viragomann @michmoor
                last edited by

                @michmoor said in Outbound NAT - lose connectivity:

                The documentation states to use an Alias

                As mentioned here three times already, the translation address has to be assigned to the pfSense interface, either its's the primary interface address or a virtual IP.

                You can state an alias though, but this condition has to be matched anyway.
                Any IP assigned to pfSense interfaces can be selected from the drop-down. That's why I'm wondering that you were stating an alias there.

                You can also translate the source to any other address, but doing so, this IP has to be routed to pfSense on the destination device, which might not be the case in your network, I guess.

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate @michmoor
                  last edited by Derelict

                  @michmoor

                  We do this all the time. It works.

                  You should post a screen shot of your Outbound NAT configuration. And the VIP configuration.

                  If this is just one address you should try it using the address instead of the Alias to eliminate any potential limitations there. With a VIP defined you should be able to select the VIP there and avoid using the alias entirely.

                  ETA (jinx)

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  M 1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    You just need to add the IP as an IPAlias VIP on the DMZ and it will work fine.

                    As mentioned you can translate outbound to anything you like but without that, in this situation, the replies will fail.

                    Steve

                    1 Reply Last reply Reply Quote 1
                    • Bob.DigB
                      Bob.Dig LAYER 8
                      last edited by Bob.Dig

                      I am with viragomann, I still don't get why a VIP should be uses if the IP is a private one, just use pfSense IP-address on that interface for NATing.
                      So probably I missed the usecase here.

                      DerelictD 1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate @Bob.Dig
                        last edited by

                        @bob-dig You certainly can do that.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Sure you can do that and it will work out of the box. But if you translate to a different IP you can see that on the destination so you could use it to identify traffic, for example.

                          M 2 Replies Last reply Reply Quote 2
                          • M
                            michmoor LAYER 8 Rebel Alliance @stephenw10
                            last edited by

                            @stephenw10 Creating an IP Alias was the ticket. Thanks everyone.

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            1 Reply Last reply Reply Quote 0
                            • M
                              michmoor LAYER 8 Rebel Alliance @stephenw10
                              last edited by

                              @stephenw10 said in Outbound NAT - lose connectivity:

                              Sure you can do that and it will work out of the box. But if you translate to a different IP you can see that on the destination so you could use it to identify traffic, for example.

                              This is pretty much one of two reasons why this was needed here.

                              Firewall: NetGate,Palo Alto-VM,Juniper SRX
                              Routing: Juniper, Arista, Cisco
                              Switching: Juniper, Arista, Cisco
                              Wireless: Unifi, Aruba IAP
                              JNCIP,CCNP Enterprise

                              1 Reply Last reply Reply Quote 1
                              • M
                                michmoor LAYER 8 Rebel Alliance @Derelict
                                last edited by

                                @derelict Thanks for your help. I was using an Alias but NOT the IP Alias which is what was needed here. Thank you for your help here.

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.