Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Domain Controller behind pfsense NAT

    Scheduled Pinned Locked Moved NAT
    14 Posts 4 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      William Bento Rodrigues @michmoor
      last edited by

      @michmoor Despite the interface being called the WAN all of pfsense interfaces (LAN and WAN) are in a private network. None of them can be accessed through the internet.

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @William Bento Rodrigues
        last edited by

        @William-Bento-Rodrigues Well why make it pfsense "wan" then... Just make it another lan.. Then you don't have to worry about port forwarding and nat.. And you can just create firewall rules to allow what you wan..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        W 1 Reply Last reply Reply Quote 1
        • W
          William Bento Rodrigues @johnpoz
          last edited by William Bento Rodrigues

          @johnpoz as it's configured only for NAT1:1 the firewall rules are allowing all traffic. I'm not filtering anything. Just to make more clear the LAN interface is OT (automation) and WAN interface is IT (it's IT vlan). Despite it being two internal networks, we need to translate an OT device into an IT IP to allow remote desktop, patch and so on within the IT network.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @William Bento Rodrigues
            last edited by

            @William-Bento-Rodrigues And does this "wan" get you to other networks? If not then its not a WAN..

            Been many years since worked in the server area and AD, etc.. But your still doing nat.. And is this network your coming from setup in your AD even.. Just seems like a horrible setup for what reason other than complication and problems..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            W 1 Reply Last reply Reply Quote 1
            • W
              William Bento Rodrigues @johnpoz
              last edited by

              @johnpoz thank your for feedback but it's the client design. do you any idea how to make it work?

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @William Bento Rodrigues
                last edited by johnpoz

                @William-Bento-Rodrigues So the client told you to make this the wan and pfsense and nat to our stuff behind it? or the client set this all up and called you to try and make it work?

                As to how to make it work, yeah don't nat and set it up how any normal network would be setup ;)

                Worked for a MSP for many years, 13 something - saw a lot of crazy customer setups... Never saw where some customer put their AD DCs behind a nat router to the rest of their network ;) Because well that is just insane..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                M W 2 Replies Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @johnpoz
                  last edited by

                  @johnpoz said in Domain Controller behind pfsense NAT:

                  put their AD DCs behind a nat router to the rest of their network ;) Because well that is just insane..

                  ehhhh...I've seen it. Im living it now. We got IP overlap so we needed to DNAT or SNAT

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  W 1 Reply Last reply Reply Quote 0
                  • W
                    William Bento Rodrigues @johnpoz
                    last edited by

                    @johnpoz pfsense is a legacy of the site.

                    1 Reply Last reply Reply Quote 0
                    • W
                      William Bento Rodrigues @michmoor
                      last edited by

                      @michmoor have you figured out a way to do it?

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @William Bento Rodrigues
                        last edited by

                        @William-Bento-Rodrigues
                        Depending on the traffic direction you will need to set up either a SNAT or DNAT.
                        In your example from "WAN" to LAN you need to set up a DNAT with the appropriate firewall rules.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        W 1 Reply Last reply Reply Quote 0
                        • W
                          William Bento Rodrigues @michmoor
                          last edited by

                          @michmoor thank you! would you have like screenshot on how to do it in pfsense?

                          S 1 Reply Last reply Reply Quote 0
                          • S
                            SteveITS Galactic Empire @William Bento Rodrigues
                            last edited by

                            @William-Bento-Rodrigues Forwarding port 53 would provide DNS, but the workstation would need to know to use that WAN IP…probably a domain override on the upstream router. But then AD DNS would respond with the DNS Server IP. Lots of monkeying around with that I’d think.

                            If you get it to work you’ll presumably need other ports too for instance SMB to pick up netlogon/group policy. Not sure exactly which are needed for the “join” part.

                            Setting up static routes to the server subnet without NAT seems easier…?

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote 👍 helpful posts!

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.