Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Static route for avoid double NAT

    Scheduled Pinned Locked Moved Routing and Multi WAN
    30 Posts 2 Posters 2.6k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      Antibiotic @Antibiotic
      last edited by

      @Antibiotic said in Static route for avoid double NAT:

      source of the router

      It mean 192.168.20.2?

      1 Reply Last reply Reply Quote 0
      • A Offline
        Antibiotic @Antibiotic
        last edited by

        @Antibiotic said in Static route for avoid double NAT:

        for the routers traffic

        It mean 192.168.20.1?

        V 1 Reply Last reply Reply Quote 0
        • V Offline
          viragomann @Antibiotic
          last edited by

          @Antibiotic
          Your rule set on the ASUS interface doesn't allow any traffic from 192.168.100.0/24 apart from DNS, NTP und IGMP.
          So you need to add rules to allow access for the subnet behind the router.

          A 1 Reply Last reply Reply Quote 0
          • A Offline
            Antibiotic @viragomann
            last edited by Antibiotic

            @viragomann So this is clear , I have to make rule to allow traffic from 192.168.100.0/24 in pfsesne interface. Is it right? But not to clear about NAT rule?

            V 1 Reply Last reply Reply Quote 0
            • V Offline
              viragomann @Antibiotic
              last edited by

              @Antibiotic
              You don't no NAT rule. You want it to do with routes, as you mentioned.

              A 2 Replies Last reply Reply Quote 0
              • A Offline
                Antibiotic @viragomann
                last edited by Antibiotic

                @viragomann So, I need only one rule to allow traffic 192.168.100.0/24 ?And static route.

                1 Reply Last reply Reply Quote 0
                • A Offline
                  Antibiotic @viragomann
                  last edited by Antibiotic

                  @viragomann Oh god I did a rule and start working))))
                  Thank you my friend)))
                  Screenshot_11-11-2024_161446_192.168.20.1.jpeg

                  But it will correct order or better to set first as rule or doesn't matter? And also "any" ports destination gateway will correct in this rule regarding security?

                  V 1 Reply Last reply Reply Quote 0
                  • V Offline
                    viragomann @Antibiotic
                    last edited by

                    @Antibiotic
                    The order of the router and the routers LAN doesn't matter.

                    For the security point, just restrict access for 92.168.100.0/24.
                    If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                    A 3 Replies Last reply Reply Quote 0
                    • A Offline
                      Antibiotic @viragomann
                      last edited by

                      @viragomann OK thank you, but the second problem now traffic going over default gateway not over VPN gateway. But if set to VPN gateway in rule traffic not going at all?

                      V 1 Reply Last reply Reply Quote 0
                      • A Offline
                        Antibiotic @viragomann
                        last edited by Antibiotic

                        @viragomann said in Static route for avoid double NAT:

                        If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                        In this case set protocol to TCP/UDP only?

                        1 Reply Last reply Reply Quote 0
                        • V Offline
                          viragomann @Antibiotic
                          last edited by

                          @Antibiotic said in Static route for avoid double NAT:

                          OK thank you, but the second problem now traffic going over default gateway not over VPN gateway. But if set to VPN gateway in rule traffic not going at all?

                          You have already a policy-routing rule with the VPN gateway at the last position. Edit it and change the source to 192.168.100.0/24.

                          Then delete the other rule for this subnet.

                          If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                          In this case set protocol to TCP/UDP only?

                          You have already proper rules for these protocols above. No need to add additional.

                          A 1 Reply Last reply Reply Quote 0
                          • A Offline
                            Antibiotic @viragomann
                            last edited by

                            This post is deleted!
                            1 Reply Last reply Reply Quote 0
                            • A Offline
                              Antibiotic @viragomann
                              last edited by Antibiotic

                              @viragomann said in Static route for avoid double NAT:

                              You have already a policy-routing rule with the VPN gateway at the last position. Edit it and change the source to 192.168.100.0/24.

                              Screenshot_11-11-2024_17157_192.168.20.1.jpeg

                              Not to clear, what should me delete?
                              If me delete 3rd rule from down internet not working

                              V 1 Reply Last reply Reply Quote 0
                              • V Offline
                                viragomann @Antibiotic
                                last edited by

                                @Antibiotic
                                09e2ff6e-66f4-4220-af2f-29c87723f6f0-grafik.png

                                The red one.

                                In the yellow you might want to change the source address accordingly.

                                Also remember, that you have to change the source in the outbound NAT rule on the VPN interface to the new network.

                                A 3 Replies Last reply Reply Quote 0
                                • A Offline
                                  Antibiotic @viragomann
                                  last edited by Antibiotic

                                  @viragomann I would like to tell you a big thanks, now everything start working over VPN! What I have now Asus router in router mode, because want to use QOS , statistic and etc and eliminated double NAT. Thank you my friend))) Tried to make to work this static route a few times without success, now I'm happy)))

                                  1 Reply Last reply Reply Quote 0
                                  • A Offline
                                    Antibiotic @viragomann
                                    last edited by

                                    @viragomann said in Static route for avoid double NAT:

                                    Also remember, that you have to change the source in the outbound NAT rule on the VPN interface to the new network.

                                    That was a point))))

                                    1 Reply Last reply Reply Quote 0
                                    • A Offline
                                      Antibiotic @viragomann
                                      last edited by

                                      @viragomann But in this settings pfSesne firewall will logging this network 192.168.100.0/24 and pfblockerNG will see this network?

                                      V 1 Reply Last reply Reply Quote 0
                                      • V Offline
                                        viragomann @Antibiotic
                                        last edited by

                                        @Antibiotic
                                        Yes, for pfSense. pfBlocker will not care about networks by default. Just ensure that the ASUS interface is selected in "Outbound Firewall Rules".

                                        A 2 Replies Last reply Reply Quote 0
                                        • A Offline
                                          Antibiotic @viragomann
                                          last edited by

                                          @viragomann Ok)))

                                          1 Reply Last reply Reply Quote 0
                                          • A Offline
                                            Antibiotic @viragomann
                                            last edited by Antibiotic

                                            @viragomann What I do not understand, for example on Asus router DCHP server switched off and me thought that devices connected to Asus router should have IP in range from DCHP of pfSesne router. Let's say 192.168.20.122 can you please explain this? or could be better to leave DCHP server on ASus router ON?

                                            V 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.