Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    1:1Nat, two public IPs for one server with one nic

    Scheduled Pinned Locked Moved NAT
    26 Posts 5 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      leonidas-o
      last edited by leonidas-o

      @rcoleman-netgate Okay I see, you got the visual IPs, so do I. Yours is USI and Proxy ARP, I'm simply using WAN and IP Alias.
      You got the NAT 1:1 mappings, the external IP to internal IP and destination "*".
      And finally you have some firewall rules. Okay, I thought if using 1:1 Nat it will automagically add the rules, so this is not the case and I have to add the rules, I see.

      When I try to access the bbb service from a external connection/ not inside VPN, I see that the firewall is blocking for destination 10.10.10.2, which is the WAN address according to my network/interfaces conf:
      Log:

      Blocked -> WAN    171.x.x.x:48365    10.10.10.2:443	   tcp
      

      Firewall rules:
      So therefore my rule from above wasn't working, wrong source wrong destination:

      Proto: IPv4 *    Source: 94.xx.xx.b    Port: *    Dest: 10.1.1.57    Port: *
      

      When adding this, no blocking messages anymore, but can't still reach the bbb service:

      Proto: IPv4 *    Source: *    Port: *    Dest: WAN address    Port: *
      

      But this rule is actually not what I want, as it opens everything to WAN address, I would need something like this:

      Proto: IPv4 *    Source: 94.xx.xx.b    Port: *    Dest: WAN address    Port: *
      

      But this does not work of course, as the log clearly shows, that the source IP is the IP of a device and not the ip of my second public IP (VIP).

      But now I'm confused, how can then my port forward for the main public IP from my initial post even work?

      Interface: WAN    Proto: TCP/UDP    Source addr: 94.xx.xx.a    Source ports: *    Dest address: WAN address    Dest ports: 443 (HTTPS)    NAT IP: 10.1.1.32    NAT ports: 4430
      

      It automatically creates a firewall rule, and the source address is set to the main public IP (94.xx.xx.a). I tested it and all my other services behind traefik/443 are still working. This doesn't make sense to me right now.

      And also, do I need a port forwarding as well? If so, what is the 1:1 Nat entry actually doing in the end?

      YcldoroY 1 Reply Last reply Reply Quote 0
      • YcldoroY
        Ycldoro @leonidas-o
        last edited by

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • L
          leonidas-o
          last edited by

          I have the feeling that I'm missing something in my proxmox network/interfaces conf file to make 1:1 Nat to work. The conf file has only knowledge about 94.x.x.A (The main public IP address) but not about 94.x.x.B (the second public IP address).

          So this is the "Masquerading (NAT) with iptables" configuration according the proxmox docs (https://pve.proxmox.com/wiki/Network_Configuration).

          1 Reply Last reply Reply Quote 0
          • L
            leonidas-o
            last edited by leonidas-o

            This post is deleted!
            1 Reply Last reply Reply Quote 0
            • L
              leonidas-o
              last edited by

              @rcoleman-netgate I think I could figure out the proxmox part. I played around with it a little bit, especially the post routing part, and while I entered through my main public IP A via wireguard, my IP outside was public IP B. So this makes sense for me right now:

              auto enp0s31f6
              iface enp0s31f6 inet static
                address 94.PUBLIC.IP.A
                netmask 255.255.255.192
                gateway 94.x.x.x
                mtu 1500
                post-up echo 1 > /proc/sys/net/ipv4/ip_forward
                post-up echo 1 > /proc/sys/net/ipv6/conf/all/forwarding
                post-up ip addr add 94.PUBLIC.IP.B/26 dev $IFACE label $IFACE:0
                post-down ip addr del 94.PUBLIC.IP.B/26 dev $IFACE label $IFACE:0
                post-up iptables -t nat -A PREROUTING -i enp0s31f6 -p tcp -d 94.PUBLIC.IP.A -m multiport ! --dport 22,8006,179 -j DNAT --to 10.10.10.2
                post-up iptables -t nat -A PREROUTING -i enp0s31f6 -p udp -d 94.PUBLIC.IP.A -m multiport ! --dport 5405:5412,4789 -j DNAT --to 10.10.10.2
                post-up iptables -t nat -A PREROUTING -i enp0s31f6 -d 94.PUBLIC.IP.B -j DNAT --to 10.10.10.3
              
              iface enp0s31f6 inet6 static
                address 2a01:4f8:10b:2ee8::2
                netmask 64
                gateway fe80::1
              
              
              auto vmbr10
              iface vmbr10 inet static
                      address 10.10.10.1/29
                      bridge-ports none
                      bridge-stp off
                      bridge-fd 0
                      post-up   iptables -t nat -A POSTROUTING -s '10.10.10.2/32' -o enp0s31f6 -j SNAT --to-source 94.PUBLIC.IP.A
                      post-down iptables -t nat -D POSTROUTING -s '10.10.10.2/32' -o enp0s31f6 -j SNAT --to-source 94.PUBLIC.IP.A
                      post-up   iptables -t nat -A POSTROUTING -s '10.10.10.3/32' -o enp0s31f6 -j SNAT --to-source 94.PUBLIC.IP.B
                      post-down iptables -t nat -D POSTROUTING -s '10.10.10.3/32' -o enp0s31f6 -j SNAT --to-source 94.PUBLIC.IP.B
              

              So now back at the 1:1 Nat issue/ Virtual IP. As you can see (vmbr10) I'm using 10.10.10.1/29 as the address and 10.10.10.2 for WAN. Now I thought, I will simply add 10.10.10.3 to the post routings and inside pfsense create a virtual IP (IP Alias) with 10.10.10.3 and a 1:1 Nat (WAN external: 10.10.10.3 to internal MY_VM_IP).
              I don't know how virtual IPs (IP Alias) behave, right now it's not working but It has to be something in this direction, right?

              P.S. 10.10.10.3 does not exists as a real interface of pfsense, just as virtual IP (IP Alias). Shouldn't I be able to route the packets to it like I do it with 10.10.10.2?

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @leonidas-o
                last edited by

                @leonidas-o
                Yes, an IP alias is just an additional IP on the interface. If assigned, pfSense answers ARP requests for this IP.

                Run a packet capture on pfSense on WAN, enter 10.10.10.3 into the IP filter box, while you try to access the additional public IP from outside to see if the packets are forwarded correctly.

                L 1 Reply Last reply Reply Quote 0
                • L
                  leonidas-o @viragomann
                  last edited by leonidas-o

                  @viragomann they are actually not routed correctly.

                    post-up iptables -t nat -A PREROUTING -i enp0s31f6 -p tcp -d 94.x.x.A -m multiport ! --dport 22,8006,179 -j DNAT --to 10.10.10.2
                    post-up iptables -t nat -A PREROUTING -i enp0s31f6 -p udp -d 94.x.x.A -m multiport ! --dport 5405:5412,4789 -j DNAT --to 10.10.10.2
                    post-up iptables -t nat -A PREROUTING -i enp0s31f6 -d 94.x.x.B -j DNAT --to 10.10.10.3
                  

                  The prerouting here is not able to distinct between -d 94.x.x.A and -d 94.x.x.B and I don't know why. It always uses the rule with -d 94.x.x.A and routes to --to 10.10.10.2. Even if I manually type https://94.x.x.B into the browser, I end up at the traefik proxy which means the first rule of these three was used.

                  But for me the overview looks fine. Do you see anything, am I missing anything iptables specific?

                  iptables -t nat -L -n

                  Chain PREROUTING (policy ACCEPT)
                  target     prot opt source               destination         
                  DNAT       tcp  --  0.0.0.0/0            94.x.x.A        multiport dports  !22,8006,179 to:10.10.10.2
                  DNAT       udp  --  0.0.0.0/0            94.x.x.A        multiport dports  !5405:5412,4789 to:10.10.10.2
                  DNAT       all  --  0.0.0.0/0            94.x.x.B         to:10.10.10.3
                  
                  Chain INPUT (policy ACCEPT)
                  target     prot opt source               destination         
                  
                  Chain OUTPUT (policy ACCEPT)
                  target     prot opt source               destination         
                  
                  Chain POSTROUTING (policy ACCEPT)
                  target     prot opt source               destination         
                  SNAT       all  --  10.10.10.2           0.0.0.0/0            to:94.x.x.A
                  SNAT       all  --  10.10.10.3           0.0.0.0/0            to:94.x.x.B
                  
                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @leonidas-o
                    last edited by

                    @leonidas-o said in 1:1Nat, two public IPs for one server with one nic:

                    Even if I manually type https://94.x.x.A into the browser

                    You mean https://94.x.x.B, I guess.

                    Did you investigate this with packet capture on pfSense, or is this your assumption of what you see?

                    L 1 Reply Last reply Reply Quote 0
                    • L
                      leonidas-o @viragomann
                      last edited by

                      @viragomann oh yes, I meant Ip address B. Corrected that typo.

                      No haven't checked that with packet capture as I ended Up at a "This connection is not private" site and when clicked on "view certificate" it shows "TRAEFIK DEFAULT CERT - self signed cert". Therefore it's pretty clear that it's traefik. If it would work either the 1:1 Nat works and the bbb service should be shown or simply timing out as firewall rules are maybe missing or whatever, but not traefik self signed cert.

                      I can still do a packet capture, maybe it reveals something helpful.

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @leonidas-o
                        last edited by

                        @leonidas-o said in 1:1Nat, two public IPs for one server with one nic:

                        Therefore it's pretty clear that it's traefik

                        Agree, you see that traefik is responding. But you don't determine, why the packets go to traefik.
                        So is it on Proxmox or on pfSense??

                        L 1 Reply Last reply Reply Quote 0
                        • L
                          leonidas-o @viragomann
                          last edited by

                          @viragomann I got the pfsense virtualised, so the entry point is proxmox (the Proxmox/Debian network/interfaces file controls to redirect "almost" everything to pfsense). Therefore I have to solve that iptables prerouting issue first. Right now, it doesn't make any sense to me, why it is ignoring the destination IPs.

                          V 1 Reply Last reply Reply Quote 0
                          • V
                            viragomann @leonidas-o
                            last edited by

                            @leonidas-o said in 1:1Nat, two public IPs for one server with one nic:

                            Therefore I have to solve that iptables prerouting issue first.

                            Both of your public IPs go to the same pfSense interface, even each to a specific private IP, assumed it works properly.
                            But how did you determine, that Proxmox does the forwarding wrong without knowing which IP pfSense is seeing?

                            You can sniff the traffic either on pfSense WAN or on the Proxmox bridge, but without doing this you're standing in the dark at all.

                            L 1 Reply Last reply Reply Quote 0
                            • L
                              leonidas-o @viragomann
                              last edited by

                              @viragomann I have a port forwarding for traefik:

                              Interface: WAN    Proto: TCP/UDP    Source addr: *    Source ports: *    Dest address: WAN address    Dest ports: 443 (HTTPS)    NAT IP: 10.1.1.32    NAT ports: 4430
                              

                              Is uses "WAN address" (10.10.10.2) for destination address. I Don't have any port forwardings for the virtual IP (10.10.10.3), only the 1:1 Nat setting.

                              So, I would expect, that it forwards only the 10.10.10.2 traefik and would distinguish between the real Wan interface and the virtual IP. If it can't do that, how would you ever be able to achieve what I want?

                              V 1 Reply Last reply Reply Quote 0
                              • V
                                viragomann @leonidas-o
                                last edited by

                                @leonidas-o
                                I know this rule, but I don't know your others.
                                I's better assure of something than do some assumptions of it. But this seems to feckless here.

                                L 1 Reply Last reply Reply Quote 0
                                • L
                                  leonidas-o @viragomann
                                  last edited by

                                  @viragomann yes sure, I agree with the assumptions point.
                                  Do I actually need port forwardings even though when having a 1:1 NAT entry setup or should it be doing something like that?

                                  I'm asking because I think I have something here. Your statement actually made me think:

                                  "Both of your public IPs go to the same pfSense interface..."

                                  I was wondering If I maybe need a port forwarding rule which is in front of the that mentioned traefik port forwarding. My thoughts were like, what if dest address as "WAN address" catches everything, so like all virtual IPs which belong to that WAN address. Would actually make sense, kind of.
                                  And if you want to distinguish, you have to place a port forwarding for each of the VIPs (it is even available via a dropdown) in front of it like:

                                  Interface: WAN    Proto: *    Source addr: *    Source ports: *    Dest address: 10.10.10.3    Dest ports: *    NAT IP: 10.1.1.57    NAT ports: *
                                  

                                  I refreshed the page with https://94.x.x.B and was not seeing the traefik self signed cert, but the BBB services self signed cert. I think that's it, it could be that you are a true hero good sir.

                                  But what is the 1:1 Nat in the end doing If still need port forwardings and firewall rules?

                                  V S 2 Replies Last reply Reply Quote 0
                                  • V
                                    viragomann @leonidas-o
                                    last edited by

                                    @leonidas-o
                                    No, the NAT 1:1 rule does the port forwarding, it doesn't need an additional rule for this if set properly.

                                    An 1:1 rule on WAN forward packets destined to, say 10.10.10.3, to 10.1.1.57 and translates the source IP in upstream packets from 10.1.1.57 to 10.10.10.3.

                                    If your rule doesn't work recheck the settings.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      SteveITS Galactic Empire @leonidas-o
                                      last edited by

                                      @leonidas-o said in 1:1Nat, two public IPs for one server with one nic:

                                      still need port forwardings and firewall rules

                                      https://docs.netgate.com/pfsense/en/latest/nat/1-1.html
                                      "All traffic initiated on the Internet destined for the specified public IP address on the mapping will be translated to the private IP address, then evaluated against the firewall ruleset on the inbound WAN interface. If matching traffic is permitted by the firewall rules to a target of the private IP address, it will be passed to the internal host."

                                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                      Upvote 👍 helpful posts!

                                      L 1 Reply Last reply Reply Quote 0
                                      • L
                                        leonidas-o @SteveITS
                                        last edited by

                                        @viragomann @steveits thanks guys, yeah I'm starting to get a feeling for its behaviour. The most important part for me actually is: https://docs.netgate.com/pfsense/en/latest/nat/port-forwards.html#port-forwarding-and-1-1-nat

                                        "Port forwards also take precedence over 1:1 NAT. If a port forward is defined on one external IP address forwarding a port to a host, and a 1:1 NAT entry is also defined on the same external IP address forwarding everything into a different host, then the port forward remains active and continues forwarding to the original host."

                                        "Port forwards take precedence over 1:1 NAT", so as we found out that "WAN Address" matches the VIPS as well, I will have to change my port forward rules to just use the original WAN address 10.10.10.2 and ignore VIP (10.10.10.3).

                                        I have to work on the BBB docker deployment atm, it is horrible to be honest, before I can test everything out. Will report back asap, but I think that's the key actually to get all working.

                                        L 1 Reply Last reply Reply Quote 0
                                        • L
                                          leonidas-o @leonidas-o
                                          last edited by

                                          Couldn't make BigBlueButton work behind pfsense/opnsense with 1:1 NAT + Reflection etc., so I gave up on that approach. I still found a solution assigning the second public IP directly to the BBB VM, which I documented here: https://serverfault.com/questions/1121061/assigned-second-public-ip-to-vm-from-outside-not-reachable/1121266#1121266

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.