Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NAT reflection and port forwards broken in RC1

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    47 Posts 10 Posters 16.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      Supermule Banned
      last edited by

      I dont see anything in the logs….I am actually asking kindly about help to find info that is related to the matter.

      How the hell should I be able to answer what is wrong, when it doesnt tell me anything?

      It is a fresh install from scratch on 2.0 RC1 and the 1.2.3 machine is both running in the same VM environment. FreeBSD 32bit.

      So unless you can tell me where to find logs that tells me what is wrong, then I suggest you take it easy.

      Try to help instead of patronizing me...

      1 Reply Last reply Reply Quote 0
      • J Offline
        jlepthien
        last edited by

        You could start by telling us EXACTLY what you did to set it up. 'doesn't work' is not really a helpful problem description. Give us every step you did and we can help you telling where you did wrong…

        | apple fanboy | music lover | network and security specialist | in love with cisco systems |

        1 Reply Last reply Reply Quote 0
        • S Offline
          Supermule Banned
          last edited by

          I setup the box….add'ed the interfaces...WAN, LAN and OPT1. Gave them the relevant IP address ranges, did the rules and port forwards and put it online. Nothing came through to the relevant servers behind. Every internal website was going to the login page of PFSense. I couldnt access the sites from outside either. Despite the block-all rule coming last in the rule list. Everything was setup just like 1.2.3 and nothing worked. Gateway was given and I could access external sites just fine. It didnt change anything if I enabled or disabled the NAT reflection. Rebooted 3 times to see if it would change things...it did not. Upgrade to newer snapshots didnt work either.

          1 Reply Last reply Reply Quote 0
          • GruensFroeschliG Offline
            GruensFroeschli
            last edited by

            To what is your external IP set in the port forward?
            ("any" would be wrong)

            We do what we must, because we can.

            Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

            1 Reply Last reply Reply Quote 0
            • S Offline
              Supermule Banned
              last edited by

              Interface address….. :)

              1 Reply Last reply Reply Quote 0
              • J Offline
                jlepthien
                last edited by

                Please post your configuration and mask all confidential information in there. Then we can have a look at it…

                | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                1 Reply Last reply Reply Quote 0
                • S Offline
                  Supermule Banned
                  last edited by

                  Will set it up again this evening with the latest snap…. Deleted it in VMWare out of sheer anger :D

                  1 Reply Last reply Reply Quote 0
                  • J Offline
                    jlepthien
                    last edited by

                    Also do some tests from outside afterwards. eg 'telnet hostname port' to see if you get a connection. For NAT reflection to work you also need to disable the check on System->Advanced->Firewall/NAT for the reflection…

                    If it doesn't work post your configuration or at least screenshots. If you say I set up the rules, how are we supposed to know you did everything right? Did you just add the firewall rule or also the NAT rule? More details please. Source, destination and so on. But again, just post your configuration would be easier. I am still on the first RC snap and it is working with it.

                    | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                    1 Reply Last reply Reply Quote 0
                    • S Offline
                      Supermule Banned
                      last edited by

                      Will do!

                      1 Reply Last reply Reply Quote 0
                      • S Offline
                        Supermule Banned
                        last edited by

                        This is my config…

                        Just a test setup, but still doesnt work.

                        <pfsense><version>7.6</version>
                        <lastchange><theme>pfsense_ng</theme>
                        <sysctl><tunable>debug.pfftpproxy</tunable>
                        <value>default</value>
                        <tunable>vfs.read_max</tunable>
                        <value>default</value>
                        <tunable>net.inet.ip.portrange.first</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.blackhole</tunable>
                        <value>default</value>
                        <tunable>net.inet.udp.blackhole</tunable>
                        <value>default</value>
                        <tunable>net.inet.ip.random_id</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.drop_synfin</tunable>
                        <value>default</value>
                        <tunable>net.inet.ip.redirect</tunable>
                        <value>default</value>
                        <tunable>net.inet6.ip6.redirect</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.syncookies</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.recvspace</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.sendspace</tunable>
                        <value>default</value>
                        <tunable>net.inet.ip.fastforwarding</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.delayed_ack</tunable>
                        <value>default</value>
                        <tunable>net.inet.udp.maxdgram</tunable>
                        <value>default</value>
                        <tunable>net.link.bridge.pfil_onlyip</tunable>
                        <value>default</value>
                        <tunable>net.link.bridge.pfil_member</tunable>
                        <value>default</value>
                        <tunable>net.link.bridge.pfil_bridge</tunable>
                        <value>default</value>
                        <tunable>net.link.tap.user_open</tunable>
                        <value>default</value>
                        <tunable>kern.rndtest.verbose</tunable>
                        <value>default</value>
                        <tunable>kern.randompid</tunable>
                        <value>default</value>
                        <tunable>net.inet.ip.intr_queue_maxlen</tunable>
                        <value>default</value>
                        <tunable>hw.syscons.kbd_reboot</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.inflight.enable</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.log_debug</tunable>
                        <value>default</value>
                        <tunable>net.inet.icmp.icmplim</tunable>
                        <value>default</value>
                        <tunable>net.inet.tcp.tso</tunable>
                        <value>default</value>
                        <tunable>kern.ipc.maxsockbuf</tunable>
                        <value>default</value></sysctl>
                        <system><optimization>normal</optimization>
                        <hostname>pfsense</hostname>
                        <domain>localdomain</domain>
                        <group><name>all</name>

                        <scope>system</scope>
                        <gid>1998</gid>
                        <member>0</member></group>
                        <group><name>admins</name>

                        <scope>system</scope>
                        <gid>1999</gid>
                        <member>0</member>
                        <priv>page-all</priv></group>
                        <user><name>admin</name>

                        <scope>system</scope>
                        <groupname>admins</groupname>
                        <password>xxxx</password>
                        <uid>0</uid>
                        <priv>user-shell-access</priv></user>
                        <nextuid>2000</nextuid>
                        <nextgid>2000</nextgid>
                        <timezone>Europe/Copenhagen</timezone>
                        <time-update-interval><timeservers>dk.pool.ntp.org</timeservers>
                        <webgui><protocol>http</protocol>
                        <ssl-certref>xxx</ssl-certref></webgui>
                        <maximumstates><maximumtableentries><enablebinatreflection>yes</enablebinatreflection>
                        <reflectiontimeout><dnsserver>8.8.8.8</dnsserver>
                        <dnsserver>208.67.222.222</dnsserver>
                        <dnsserver>195.67.199.39</dnsserver>
                        <dnsserver>195.67.199.40</dnsserver>
                        <dnsallowoverride><firmware><allowinvalidsig></allowinvalidsig></firmware>
                        <gitsync><branch></branch></gitsync></dnsallowoverride></reflectiontimeout></maximumtableentries></maximumstates></time-update-interval></system>
                        <interfaces><wan><enable><if>em0</if>
                        <blockpriv><blockbogons><media><mediaopt><spoofmac><ipaddr>xxx.xxx.201.114</ipaddr>
                        <subnet>28</subnet>
                        <gateway>Telia</gateway></spoofmac></mediaopt></media></blockbogons></blockpriv></enable></wan>
                        <lan><enable><if>em1</if>
                        <ipaddr>192.168.1.1</ipaddr>
                        <subnet>16</subnet>
                        <media><mediaopt></mediaopt></media></enable></lan>
                        <opt1><if>em2</if>

                        <enable><spoofmac><ipaddr>192.168.10.1</ipaddr>
                        <subnet>24</subnet></spoofmac></enable></opt1></interfaces>
                        <staticroutes><dhcpd><lan><range><from>192.168.1.100</from>
                        <to>192.168.1.199</to></range></lan></dhcpd>
                        <pptpd><mode><redir><localip></localip></redir></mode></pptpd>
                        <dnsmasq><enable><domainoverrides><domain>netxxxxxx.dk</domain>
                        <ip>192.168.1.1</ip></domainoverrides></enable></dnsmasq>
                        <snmpd><syslocation><syscontact><rocommunity>public</rocommunity></syscontact></syslocation></snmpd>
                        <diag><ipv6nat></ipv6nat></diag>
                        <bridge><syslog><nat><ipsecpassthru><enable></enable></ipsecpassthru>
                        <rule><source>
                        <any><port>25</port>

                        <destination><network>wanip</network>
                        <port>25</port></destination>
                        <protocol>tcp</protocol>
                        <target>ISA</target>
                        <local-port>25</local-port>
                        <interface>wan</interface>
                        <descr><associated-rule-id>nat_4d6f7924b70f14.73209842</associated-rule-id></descr></any></rule>
                        <rule><source>
                        <any><port>80</port>

                        <destination><network>wanip</network>
                        <port>80</port></destination>
                        <protocol>tcp</protocol>
                        <target>ISA</target>
                        <local-port>80</local-port>
                        <interface>wan</interface>
                        <descr><associated-rule-id>nat_4d6f795e7b5fa4.72362536</associated-rule-id></descr></any></rule></nat>
                        <filter><rule><source>
                        <any><port>25</port>

                        <interface>wan</interface>
                        <protocol>tcp</protocol>
                        <destination><address>ISA</address>

                        <port>25</port></destination>

                        <associated-rule-id>nat_4d6f7924b70f14.73209842</associated-rule-id></any></rule>
                        <rule><source>
                        <any><port>80</port>

                        <interface>wan</interface>
                        <protocol>tcp</protocol>
                        <destination><address>ISA</address>

                        <port>80</port></destination>

                        <associated-rule-id>nat_4d6f795e7b5fa4.72362536</associated-rule-id></any></rule>
                        <rule><id><type>block</type>
                        <interface>wan</interface>
                        <tag><tagged><max><max-src-nodes><max-src-conn><max-src-states><statetimeout><statetype>keep state</statetype>
                        <os><protocol>tcp/udp</protocol>
                        <source>
                        <any><destination><any></any></destination></any></os></statetimeout></max-src-states></max-src-conn></max-src-nodes></max></tagged></tag></id></rule>
                        <rule><type>pass</type>

                        <interface>lan</interface>
                        <source>
                        <network>lan</network>

                        <destination><any></any></destination></rule></filter>
                        <shaper><ipsec><preferoldsa></preferoldsa></ipsec>
                        <aliases><alias><name>ISA</name>

                        <address>192.168.1.50</address>

                        <descr><type>host</type>
                        <detail></detail></descr></alias></aliases>
                        <proxyarp><cron><minute>0</minute>
                        <hour></hour>
                        <mday>
                        </mday>
                        <month></month>
                        <wday>
                        </wday>
                        <who>root</who>
                        <command></command>/usr/bin/nice -n20 newsyslog
                        <minute>1,31</minute>
                        <hour>0-5</hour>
                        <mday></mday>
                        <month>
                        </month>
                        <wday></wday>
                        <who>root</who>
                        <command></command>/usr/bin/nice -n20 adjkerntz -a
                        <minute>1</minute>
                        <hour>3</hour>
                        <mday>1</mday>
                        <month>
                        </month>
                        <wday></wday>
                        <who>root</who>
                        <command></command>/usr/bin/nice -n20 /etc/rc.update_bogons.sh
                        <minute>
                        /60</minute>
                        <hour></hour>
                        <mday>
                        </mday>
                        <month></month>
                        <wday>
                        </wday>
                        <who>root</who>
                        <command></command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout
                        <minute>1</minute>
                        <hour>1</hour>
                        <mday></mday>
                        <month>
                        </month>
                        <wday></wday>
                        <who>root</who>
                        <command></command>/usr/bin/nice -n20 /etc/rc.dyndns.update
                        <minute>
                        /60</minute>
                        <hour></hour>
                        <mday>
                        </mday>
                        <month></month>
                        <wday>
                        </wday>
                        <who>root</who>
                        <command></command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot
                        <minute>30</minute>
                        <hour>12</hour>
                        <mday></mday>
                        <month>
                        </month>
                        <wday>*</wday>
                        <who>root</who>
                        <command></command>/usr/bin/nice -n20 /etc/rc.update_urltables</cron>
                        <wol><rrd><enable></enable></rrd>
                        <load_balancer><monitor_type><name>ICMP</name>
                        <type>icmp</type></monitor_type>
                        <monitor_type><name>TCP</name>
                        <type>tcp</type></monitor_type>
                        <monitor_type><name>HTTP</name>
                        <type>http</type>

                        <options><path>/</path>
                        <host>200</host></options></monitor_type>
                        <monitor_type><name>HTTPS</name>
                        <type>https</type>

                        <options><path>/</path>
                        <host>200</host></options></monitor_type>
                        <monitor_type><name>SMTP</name>
                        <type>send</type>

                        <options><send>EHLO nosuchhost</send>
                        <expect>250-</expect></options></monitor_type></load_balancer>
                        <widgets><sequence>system_information-container:col1:show,captive_portal_status-container:col1:close,carp_status-container:col1:close,cpu_graphs-container:col1:close,gateways-container:col1:close,gmirror_status-container:col1:close,installed_packages-container:col1:close,interface_statistics-container:col1:close,interfaces-container:col2:show,ipsec-container:col2:close,load_balancer_status-container:col2:close,log-container:col2:close,picture-container:col2:close,rss-container:col2:close,services_status-container:col2:close,traffic_graphs-container:col2:close</sequence></widgets>
                        <revision><time>1299152187</time>

                        <username>admin</username></revision>
                        <openvpn><l7shaper><container></container></l7shaper>
                        <dnshaper><cert><refid>4d6f3f19cede8</refid>

                        <crt>xxx</crt>
                        <prv>xxx</prv></cert>
                        <ppps><gateways><gateway_item><interface>wan</interface>
                        <gateway>xx.xxx.201.113</gateway>
                        <name>Telia</name>
                        <weight>1</weight>
                        <descr><defaultgw></defaultgw></descr></gateway_item></gateways></ppps></dnshaper></openvpn></wol></proxyarp></shaper></syslog></bridge></staticroutes></lastchange></pfsense>

                        1 Reply Last reply Reply Quote 0
                        • W Offline
                          wallabybob
                          last edited by

                          I may not be interpreting your config.xml correctly but it looks to me that you have configured your port forwarding rules incorrectly. For example, the rule for SMTP port forwarding apparently says source port=25 and destination port=25. It is very unlikely that an access attempt to your SMPT server will come from port 25. Sure, it will be headed for destination port 25. I think you should have a source port of Any (* in the web GUI). I didn't look at your other port forwarding rules.

                          1 Reply Last reply Reply Quote 0
                          • S Offline
                            Supermule Banned
                            last edited by

                            Works fine in 1.2.3.And has been all the time.

                            rules.jpg
                            rules.jpg_thumb

                            1 Reply Last reply Reply Quote 0
                            • J Offline
                              jlepthien
                              last edited by

                              External port must be any. Never does a server connect from his port 25 to 25….

                              | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                              1 Reply Last reply Reply Quote 0
                              • S Offline
                                Supermule Banned
                                last edited by

                                Not even if you relay to somewhere else?

                                @jlepthien:

                                External port must be any. Never does a server connect from his port 25 to 25….

                                1 Reply Last reply Reply Quote 0
                                • J Offline
                                  jlepthien
                                  last edited by

                                  A connection always comes from a port >1023 to the destination service port like 80 or 25…

                                  | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                                  1 Reply Last reply Reply Quote 0
                                  • S Offline
                                    Supermule Banned
                                    last edited by

                                    My ISP provides relay on the test setup on port 25….works like a charm.

                                    1 Reply Last reply Reply Quote 0
                                    • W Offline
                                      wallabybob
                                      last edited by

                                      It looks to me that your port forwarding rule for SMTP will match only packets arriving on the WAN interface if the source port is 25 and destination port is 25.

                                      I think you should look closely at your firewall logs to see how many access attempts to your SMTP server come from port 25.

                                      My SMTP port forwarding rule specifies source port=any destination port=25. My rule works. Your rule is more restrictive than mine and doesn't work.

                                      Repeat above (with appropriate port number changes) for every port forward in which you have specified source port = destination port.

                                      1 Reply Last reply Reply Quote 0
                                      • S Offline
                                        Supermule Banned
                                        last edited by

                                        I have no issues at all with mail…. :) I do understand what you mean, but it works fine.

                                        1 Reply Last reply Reply Quote 0
                                        • ? This user is from outside of this forum
                                          Guest
                                          last edited by

                                          Wow, that is surprising that 1.2.3 works with that those port forwards. I noticed your RDP ports, and wanted to let you know you can change windows' default RDP port through the registry. Though you're achieving the same affect by using NAT, which is pretty cool :-)

                                          So your ISP is doing NAT for you. Does that mean that when it sees a packet with a destination port 25 (or whatever), it relays/forwards it to you from port 25 making the source 25? That's a bit interesting.

                                          1 Reply Last reply Reply Quote 0
                                          • S Offline
                                            Supermule Banned
                                            last edited by

                                            I am only forwarding the ports….rules are sourceport range: any. :)

                                            Sorry for my mistake...

                                            rules.jpg
                                            rules.jpg_thumb

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.