Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DMZ though ISP router

    Scheduled Pinned Locked Moved NAT
    10 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      Danil 0
      last edited by

      Unfortunately with my ISP i have to use their router. It does not support bridge mode but it does allow DMZ to one device. I have public ip on pfsense interface.
      Problem is that i can only access to port 443 from outside. It is 0 packets, if i try some other port. Example, pics 1 and 2.

      Hping_443 2.png

      Hping_80 2.png

      My ISP told me that i must to do a port forwarding. Unfortunately, i do not understand that i must to forward, if i have 0 packets on port 80 or 22. I can not setup IPsec or ssh. It is not possible to access pfsense from outside.
      ISP told that it is clean on their way, no bugs etc.
      Can any one explain me, that they bear in mind port forwarding?

      Thanks for help.

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @Danil 0
        last edited by Gertjan

        @Danil-0 said in DMZ though ISP router:

        I have public ip on pfsense interface

        Doesn't match your :

        @Danil-0 said in DMZ though ISP router:

        It does not support bridge mode but it does allow DMZ to one device.

        DMZ (IMHO) : everything - port by port, is natted to the device decalred as the DMZ device, which is normally the IP of pfSense.

        As your pfSense has a public IP on its WAN, all traffic already arrives on your pfSense WAN.
        Your ISP router isn't behaving as a router, but as a 'bridge'.

        After seen this :

        81ea5ad2-ee9c-4193-9ed8-19e059542530-image.png

        I have to ask : what are your your WAN firewall rules ?
        By default, there are no rules which means that de hidden rule '1000000103' blocks any incoming requests.
        If you let pass https (port 443 TCP traffic) you have to add a pass rule for that.
        Same for ssh.

        Btw : this is considered very bad practice.
        Normally, you should activate an (example) OpenVPN server, and use the OpenVPN access to access pfSEnse or other LAN based devices.

        edit : same thing for 'ping' (protocol ICMP) : you have to set up a pass rule on the WAN interface so pfSense can receive ICMP packets, and thus answer.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        D 1 Reply Last reply Reply Quote 0
        • D
          Danil 0 @Gertjan
          last edited by Danil 0

          This post is deleted!
          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @Danil 0
            last edited by

            @Danil-0
            Maybe you have to open additional ports on the ISP router even you have set the DMZ.

            D 1 Reply Last reply Reply Quote 0
            • D
              Danil 0 @viragomann
              last edited by Danil 0

              This post is deleted!
              GertjanG 1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @Danil 0
                last edited by Gertjan

                @Danil-0

                488190f5-acd6-43f3-b1c8-d71d9a8fbf67-image.png

                That's a no--go.

                This rule is placed on WAN interface.
                Traffic coming into your WAN interface originates form the internet.
                Fact : You can't receive 'from' the Internet RFC1918 (like 192.168.1.0/24 etc)
                Or, "LAN Address" is an alias that contains your RFC1918 - the 192.168.3xxxx

                Result : this rule will never match (thus pass) any traffic.

                The state counters will stay at 0/0 forever.
                Change the "LAN Address" for "WAN address" and suddenly things start to work : the rule starts to pass traffic.

                Again : normally, you should never do this.
                If you don't know much about firewall : you should never do this.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                D 1 Reply Last reply Reply Quote 0
                • D
                  Danil 0 @Gertjan
                  last edited by

                  @Gertjan said in DMZ though ISP router:

                  Again : normally, you should never do this.

                  I know that i'm not do normal this. It is testing time :), i understand that it is not possible keep open :). it is auto added rule, when i made port forwarding, here is pics:
                  Port forwarding.png
                  Since it do not change anythink, important is that packets pass on 443 port but not others.

                  @Gertjan said in DMZ though ISP router:

                  The state counters will stay at 0/0 forever.

                  Exactly, sorry, it was my mistake but I made screen before i start scaning because it is not my first test set up so it it long time that i testing it :). Below is screen that i make now:
                  Firewall_rules_wan.png

                  GertjanG 1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @Danil 0
                    last edited by Gertjan

                    @Danil-0

                    This :

                    92546ffd-1c2f-43b5-8d68-1daa39ac38f8-image.png

                    is ... undocumented / new / strange at least.

                    You redirect to "LAN Address", something like 192.168.1.1/24 ? but I'm not sure.

                    Like : traffic comes into WAN, goes through pfSense, is natted to 192.168.1.1, to go back into pfSense ??

                    The help text says : enter an IPv4 == the device you want to redirect to.
                    Or use an alias that contains an IPv4.

                    Like :

                    60a42e8f-11e8-4441-aefe-41a3fac981a8-image.png

                    This one works ^^

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    D 2 Replies Last reply Reply Quote 0
                    • D
                      Danil 0 @Gertjan
                      last edited by

                      @Gertjan It is issue on ISP way, thanks for your time ;).

                      1 Reply Last reply Reply Quote 0
                      • D
                        Danil 0 @Gertjan
                        last edited by

                        @Gertjan It was standard sutiations, ISP support didn't understood pfsense so they told me that i must make port forward like on ptlink 😭 but issue was that they forgotten disable firewall on router. Since it was on bridge mode but firewall blocked input.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.