• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Private WAN-address and public LAN-address Nat-problems

NAT
5
12
9.0k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    Jakk
    last edited by Jan 30, 2007, 1:11 PM

    Hi,

    I have a private WAN-address for routing into ISP-cloud. For LAN, I have public IP-addresses.

    When I assing correct addesses to WAN and LAN interfaces, the pfsense start automatically doing NAT for these LAN-addresses when I try to go to Internet. Naturally this does not work.

    Is there a way to disable NAT for LAN-addresses.

    Also the pfsense itself can not connect to pfsense-website since it is trying to use private WAN-address as the address for its outbound traffic. Can I somewhere select/configure it so that pfsense would use its LAN-address for all the outbound traffic?

    1 Reply Last reply Reply Quote 0
    • H
      hoba
      last edited by Jan 30, 2007, 1:48 PM

      This is a pretty strange setup. However you can disable NAT by going to firewall>nat, outbound tab and enabling advanced outbound nat. Then delete all the automatically created rules that are created in the table at the bottom. Save and apply.

      1 Reply Last reply Reply Quote 0
      • J
        Jakk
        last edited by Jan 30, 2007, 4:26 PM

        We took out the operator provided router (which had on its WAN interface a private address) and replaced it with pfsense firewall. That is the reason why we this strange setup.

        However, still the problem remains that Pfsense itself can not communicate with the Pfsense.com website to check updates or packakges. When doing tcpdump on wan interface, I see that the Pfsense-platform is using the Wan-port address which will route outside this operators network. Is there a way to change the address that Pfsense uses to communicate to Pfsense.com ??

        1 Reply Last reply Reply Quote 0
        • H
          hoba
          last edited by Jan 30, 2007, 4:45 PM

          I don't get how the routing should work for the public IPs if the WAN IP has no internet connectivity? Don't they NAT the private IPs somewhere in their setup before they leave into public IP space again?

          1 Reply Last reply Reply Quote 0
          • J
            Jakk
            last edited by Jan 30, 2007, 8:09 PM

            No, they do not NAT the traffic, it is only within the operators own network cloud where they use 172.x.y.z addresses as link addresses between different IP-routers.

            When this operators network connects to public Internet, they announce all the public IP-addresses that their customers are using behind those 172.x.y.z based link addresses. I would think that this is fairly common thing that different operators do, in order not waste public IP-addresses for core links.

            We could have left the operator provided Cisco router in place, and then we would only have this public IP-address subnet to play with. We also have different IP-subnet addresses (public ones again) for DMZ.

            1 Reply Last reply Reply Quote 0
            • J
              jeroen234
              last edited by Feb 1, 2007, 6:34 AM

              did you tell pfsense that it has not to block the 172.x.y.z/192.168.x.y/10.x.y.z on the wan port ?
              if not then all youre trafic to the 172 network on the wan port is blockt
              becourse those ip's are not for use on the internet

              1 Reply Last reply Reply Quote 0
              • J
                Jakk
                last edited by Feb 6, 2007, 9:26 AM

                In the Interfaces WAN:

                I have checked the option:  Block private networks

                I have created NAT-outbound my LAN-addresses in order not to NAT them to this 172…-address.
                I have also enabled advanced outbound nat -option

                1 Reply Last reply Reply Quote 0
                • J
                  jeroen234
                  last edited by Feb 7, 2007, 1:31 PM Feb 7, 2007, 1:28 PM

                  @Jakk:

                  In the Interfaces WAN:

                  I have checked the option:  Block private networks

                  this needs to be uncheckt
                  so that pfsense is not blokking you
                  172.x.y.z/192.168.x.y/10.x.y.z  are prived networks and are normal not living on the wan site of pfsense

                  1 Reply Last reply Reply Quote 0
                  • J
                    Jakk
                    last edited by Feb 8, 2007, 9:29 AM

                    Thanks, but…

                    The problem is that pfsense-itself needs to use its LAN-address (195.x.y.1) when connecting to
                    pfsense-site to check updates/packages/etc...

                    Now it insist using WAN-address 172.a.b.c for this traffic. Naturally this link-address can not connect anywhere in the real Internet. It can only route/connect within the operators network.

                    1 Reply Last reply Reply Quote 0
                    • J
                      jeroen234
                      last edited by Feb 8, 2007, 11:20 AM

                      you got a pretty messed up network
                      pfsense will alway's use the wan for its connections
                      wan is for internet
                      and lan is for youre network

                      1 Reply Last reply Reply Quote 0
                      • S
                        sullrich
                        last edited by Feb 8, 2007, 3:26 PM

                        I understand what you are wanting to do.

                        Add static routes for the DNS servers, forcing them out a custom gateway.  Do the same for the pfsense.com addresses.

                        1 Reply Last reply Reply Quote 0
                        • R
                          razor2000
                          last edited by Feb 15, 2007, 5:27 AM

                          @Jakk:

                          No, they do not NAT the traffic, it is only within the operators own network cloud where they use 172.x.y.z addresses as link addresses between different IP-routers.

                          Just wondering, but it is your ISP Covad by any chance?  I have dealt with several Covad DSL setups where the WAN range from their side is a 172.x.x.x network, and the LAN range is your normally used public range.

                          Thanks…

                          1 Reply Last reply Reply Quote 0
                          5 out of 12
                          • First post
                            5/12
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.