Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Perhaps I'm double NATing?

    Scheduled Pinned Locked Moved NAT
    12 Posts 5 Posters 705 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mvmatch
      last edited by

      Running tracert from 10.1.1.27 to 8.8.8.8 I get:

      10.1.1.1 (this is my firewall)
      172.24.179.2 (some unknown private address)
      162.24.179.2
      6 more hops
      8.8.8.8 (dns.google)

      That private address indicates double NATing, no?
      But the path is from my PC to TP-Link TL-SG1024DE switch, to Motorola MB8600 modem, to Comcast. There is nothing else in the path between the PC and the modem, so where is this private IP coming from? Is it possible to find a private IP on the Comcast side of the modem?

      S NogBadTheBadN johnpozJ JonathanLeeJ 4 Replies Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @mvmatch
        last edited by

        @mvmatch Carrier grade NAT does exist but I didn’t think Comcast used it, at least around here.

        If the response time for that hop is under 1ms it’s probably in your house.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        M 1 Reply Last reply Reply Quote 0
        • M
          mvmatch @SteveITS
          last edited by

          @steveits

          Thanks for the note Steve. The response time for that hop is 7 ms. Time to my pfSense firewall is <1 ms, which is what I would expect. I think tomorrow I'll remove the switch from the path and patch the PC directly to the modem. That would isolate everything else in the house and I'll run tracert again.

          S 1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @mvmatch
            last edited by

            @mvmatch 7ms is definitely external if we're talking wired connections. Now that I'm near a PC, if I search I see at least one post about Comcast using it in 2018.

            https://en.wikipedia.org/wiki/Carrier-grade_NAT

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            1 Reply Last reply Reply Quote 0
            • NogBadTheBadN
              NogBadTheBad @mvmatch
              last edited by NogBadTheBad

              The 3rd address looks like it’s allocated to the Air Force, unless they’ve sold some of their address space.

              ARIN WHOIS data and services are subject to the Terms of Use

              available at: https://www.arin.net/resources/registry/whois/tou/

              If you see inaccuracies in the results, please report at

              https://www.arin.net/resources/registry/whois/inaccuracy_reporting/

              Copyright 1997-2022, American Registry for Internet Numbers, Ltd.

              NetRange: 162.24.0.0 - 162.24.255.255
              CIDR: 162.24.0.0/16
              NetName: BOLLING-LAN
              NetHandle: NET-162-24-0-0-1
              Parent: NET162 (NET-162-0-0-0-0)
              NetType: Direct Allocation
              OriginAS:
              Organization: Air Force Systems Networking (7ESG)
              RegDate: 1996-11-08
              Updated: 2021-12-14
              Ref: https://rdap.arin.net/registry/ip/162.24.0.0

              OrgName: Air Force Systems Networking
              OrgId: 7ESG
              Address: 501 E. Moore Drive
              City: MAFB-Gunter Annex
              StateProv: AL
              PostalCode: 36114
              Country: US
              RegDate: 2008-06-05
              Updated: 2019-06-20
              Ref: https://rdap.arin.net/registry/entity/7ESG

              OrgTechHandle: REGIS10-ARIN
              OrgTechName: Registration
              OrgTechPhone: +1-844-347-2457
              OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
              OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN

              OrgAbuseHandle: REGIS10-ARIN
              OrgAbuseName: Registration
              OrgAbusePhone: +1-844-347-2457
              OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
              OrgAbuseRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN

              ARIN WHOIS data and services are subject to the Terms of Use

              available at: https://www.arin.net/resources/registry/whois/tou/

              If you see inaccuracies in the results, please report at

              https://www.arin.net/resources/registry/whois/inaccuracy_reporting/

              Copyright 1997-2022, American Registry for Internet Numbers, Ltd.

              Andy

              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @mvmatch
                last edited by johnpoz

                @mvmatch just because you see a rfc1918 in your trace does not have to mean its a nat happening. While sure there could be one, it also could just mean that the router your hoping across answered with its loopback address.

                Or your just going across a transit network inside your isp network, does not mean that traffic is being natted.

                I use to get rfc1918 at the 3rd hop while my isp was doing some IP work.. Now it seems to be back to public space..

                example if that 3rd hop is actually airforce IP range, that 162.24 address - they could just be using that inside their network as transit as well. Would be very bad practice for isp to do that, but see it all the time inside datacenters where like to use dod space for their internal networks. My old company did this.. Not a fan of the practice - but it happens a lot to be honest.

                A rfc1918 or non owned IP ranges can be used inside a private network without ill effect, your isp network is actually a local network that your connected too, doesn't mean there is nat happening.

                You could prob start seeing such practice happen more an more even on larger ISPs, as IPv4 space gets more and more scarce and valuable. There is nothing saying the IPs used inside an ISP for their own internal routing needs to be public space..

                Where they might of used some of their external IP space internally on their network before, now they are switching those out for rfc1918 space, or even using space that is not theirs that they or their customers would have no need/want to actually get to. So they can leverage the public IP space for their edge devices and customers.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                M 1 Reply Last reply Reply Quote 0
                • M
                  mvmatch @johnpoz
                  last edited by

                  @johnpoz

                  Well this discussion has been enlightening. Thank you all for the education.

                  It's not that I can see any problem in my network connection at this time, but I'm about to configure some port forwarding and this RFC1918 hop may prevent that. Then again it might not I guess. I'll just have to try it and see.

                  It's still disconcerting to me to see an RFC1918 address at the first hop.

                  S johnpozJ 2 Replies Last reply Reply Quote 0
                  • S
                    SteveITS Galactic Empire @mvmatch
                    last edited by

                    @mvmatch Years ago our office used an ISP that used RFC1918 internally, though we had a public IPv4 address. So it's possible to work like that, just a bit odd, and can cause a conflict if that first RFC1918 range is used on your LAN. But it's possible to do if they set up their routing tables correctly.

                    If you don't have a public IP though, then inbound connections aren't going to work. What is the WAN IP on your pfSense?

                    It is of course possible to use double NAT with inbound if the ISP modem/router is providing NAT, just have it forward all ports (maybe called DMZ) to your pfSense WAN IP. That should work for most things; IIRC inbound FTP is an exception.

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote 👍 helpful posts!

                    M 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @mvmatch
                      last edited by johnpoz

                      @mvmatch said in Perhaps I'm double NATing?:

                      and this RFC1918 hop may prevent that.

                      No not if your pfsense as a public IP on its wan.. Maybe I was not clear enough about transit network(s) inside your isp that has nothing to do with nat, or your pfsense actually being exposed via a public IP.

                      maybe this helps?

                      routing.jpg

                      So your pfsense has a 4.5.6.x address on its wan, this is a public IP.. And the internet knows how to route to get there, at some point it will hit the actual ISP edge network in routing to get there.. Once that traffic hits your isp edge saying hey I want to get to this 4.5.6.x address - doesn't matter what the internal hops inside the isp IP address are..

                      The router at the edge 1.2.3.4 sees traffic saying it wants to go to 4.5.6.x, says oh next hop is 162.24.179.2 lets say, and that router says oh you want to get to 4.5.6.x send it to 172.24.179.2.. This router says oh yeah I am connected to that let me send that to your router at 4.5.6.x.. Your router says oh I have a port forward that says if traffic to my address wants to go to port 443, send it to 10.1.1.x

                      The only place nat has to happen is at your router, converting your 10.x address to a public IP..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 1
                      • M
                        mvmatch @SteveITS
                        last edited by

                        @steveits
                        Sorry Steve, I'm a little slow. It's been many years since I was a sysadmin, and frankly I've forgotten most of what was routine since my retirement. I'm just grateful for the discussion.

                        It's a public address. 76.63.something.something. I looked this up a few days ago. Don't remember exactly, maybe 76.63.3.9? but the gateway is 76.63.2.1 I'll look up the WAN addy to confirm if needed.

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • JonathanLeeJ
                          JonathanLee @mvmatch
                          last edited by

                          @mvmatch have you blocked port 443 form accessing DNS?

                          "Similar to DNS over TLS, clients may also use DNS over HTTPS (DoH). This is harder to block as it uses port 443. Blocking port 443 on common public DNS servers may help (e.g. 1.1.1.1, 8.8.8.8).

                          Some browsers automatically attempt to use DNS over HTTPS because they believe it to be more secure and better for privacy, though that is not always the case. Each browser may have its own methods of disabling this feature. Firefox uses a “canary” domain use-application-dns.net by default. If Firefox cannot resolve this name, Firefox disables DNS over HTTPS.

                          To prevent Firefox from using DNS over HTTPS, add the following to the DNS Resolver custom options:"

                          https://docs.netgate.com/pfsense/en/latest/recipes/dns-block-external.html

                          Make sure to upvote

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @mvmatch
                            last edited by

                            @mvmatch see my edit of last post with a little drawing - maybe that will help you understand that ISP can use internal rfc1918 space without a nat..

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.