Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Help on setup WAN - Lan Routing and Port Forwarding

    Scheduled Pinned Locked Moved Routing and Multi WAN
    8 Posts 3 Posters 7.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      liveeveryday
      last edited by

      I have installed on a virtual machine the pfsense with two network interfaces .
      Both interfaces are bridged .

      I have a router one adsl modem router ZTX  with ip 192.168.1.1
      and my first interface for WAN on pfsense has the ip 192.168.1.2  with 192.168.1.1(gateway).
      the other interface for the LAN has 192.168.180.1.100 / 255.255.255.0 / 192.168.1.2(gateway)

      I have a client with static ip on the lan 192.168.1.200 that runs a web server at port 80.

      I also installed squid proxy  on pfsense .
      Everything is working for the clients , they do have internet and the go out to internet through the wan interface.

      Now , how can i publish the web server outside ? how i will  forward the port 80 so if anyone hits the adsl IP to be forwarded to my LAN web server ?
      i have an ftp lan server to another computer inside the lan that i believe with the same procedure will be redirected also.

      I dont want to use the forwarding module from the adsl router to forward port 80.

      And how can i also restrict everyone not to go through the gateway 192.168.1.1 and use always the 192.168.1.2 (pfsense gateway)?

      ???

      1 Reply Last reply Reply Quote 0
      • P
        podilarius
        last edited by

        If your users are on the 192.168.1.0/24 network, and they are getting DHCP from the modem, they will probably get the gateway of 192.168.1.1. pfSense by default will block private IPs and using a gateway of 192.168.1.2 will not allow traffic to pass. You users and server needs to be in the 192.168.180.0/24 for pfSense to properly pass traffic.

        Even still, since pfSense is not the edge router (NAT from ZTX) you are going to have to use the modems port forward to push that traffic to pfsense, which can then push it to the web server.

        If you let pfSense handle the DSL authentication, you can generally have it pull an IP directly. You will need to put your DSL in bridge mode for that to work.

        1 Reply Last reply Reply Quote 0
        • L
          liveeveryday
          last edited by

          @podilarius:

          If your users are on the 192.168.1.0/24 network, and they are getting DHCP from the modem, they will probably get the gateway of 192.168.1.1. pfSense by default will block private IPs and using a gateway of 192.168.1.2 will not allow traffic to pass. You users and server needs to be in the 192.168.180.0/24 for pfSense to properly pass traffic.

          Even still, since pfSense is not the edge router (NAT from ZTX) you are going to have to use the modems port forward to push that traffic to pfsense, which can then push it to the web server.

          If you let pfSense handle the DSL authentication, you can generally have it pull an IP directly. You will need to put your DSL in bridge mode for that to work.

          Thank you for your reply ,
          I have the dhcp enabled by pfSense , (and i made a mistage the lan interafe for the client are 192.168.1.100 not 192.168.(180).)

          the lan interface is on 192.168.1.0/24 and i have 2 server on is web on .100 and another one ftp on .200 .

          all the clients also the servers have as gateway the pfsense 192.168.1.2 , and the pfsense also is connected with the "WAN" 192.168.1.1 .

          i have set on the adsl modem to forward all the port 10-10000 to the pfsense wan interface (192.168.1.2)  i dont know if this is the first step  , and what i should setup
          on pfsense on nat in order to move the 80 and 21 port  to the two server.

          1 Reply Last reply Reply Quote 0
          • P
            podilarius
            last edited by

            Thanks for the clarification on the setup. You have a configuration problem. You must have seperate network on WAN and LAN. They cannot be the same unless you are bridging other wise pfsense will not route traffic properly. You should not be able to ping your router from within the LAN as the pfsense will never be contacted. I do see how this could work for internet addresses. You can try the port forward setup so that port 80 gets forwarded over to the server, but this is not a clean setup and I would be unsure of the behavior.

            1 Reply Last reply Reply Quote 0
            • L
              liveeveryday
              last edited by

              This is how my scenario looks like.
              ISP -> Router -> pfsense for firewall proxy gateway etc - > lan + 2 servers with 80 , 21 ports open

              00.jpg
              00.jpg_thumb

              1 Reply Last reply Reply Quote 0
              • P
                podilarius
                last edited by

                this is pretty much how i imagined it. have the same subnets on both sides of the firewall is not a good idea unless you are running a filtering bridge. If you are not, then you will want to change the setup to be something like:

                ISP <–->Modem (192.168.1.1) <---> (192.168.1.2) pfSense (192.168.2.1) <---> Switch <---> (192.168.2.100) Server

                This is still a double NAT, but it is more "correct" and will route traffic much better.

                My setup is:

                ISP <----> Modem in bridge <----> (Real External IP) pfsense (private internal IP) <---> switch
                My pfsense does my ISP authentication.

                1 Reply Last reply Reply Quote 0
                • L
                  liveeveryday
                  last edited by

                  @podilarius:

                  this is pretty much how i imagined it. have the same subnets on both sides of the firewall is not a good idea unless you are running a filtering bridge. If you are not, then you will want to change the setup to be something like:

                  ISP <–->Modem (192.168.1.1) <---> (192.168.1.2) pfSense (192.168.2.1) <---> Switch <---> (192.168.2.100) Server

                  This is still a double NAT, but it is more "correct" and will route traffic much better.

                  My setup is:

                  ISP <----> Modem in bridge <----> (Real External IP) pfsense (private internal IP) <---> switch
                  My pfsense does my ISP authentication.

                  lets say that my modem has an IP 10.0.0.1 and the other point of pfsense has 10.0.0.2WAN and 192.168.1.1LAN

                  none of my lan can access the modem  because they are on  another network , the pfsense router correctly the traffic through clients and modem,
                  for example a client with ip 192.168.1.100 and gateway 192.168.1.1 can surf .
                  Now the point is how i can forward the port 80 from my ISP IP to this client….

                  all ports from the modem are forwarded to 10.0.0.1 and i want the incoming traffic from my ISP to the port 80 to go direct to 192.168.1.100 webserver for reply.

                  is there any solution?

                  1 Reply Last reply Reply Quote 0
                  • G
                    GilesW
                    last edited by

                    At present, from what you say, INCOMING traffic on Port 80 is basically being forwarded by your modem/router to Pfsense.
                    So all you should need to do is simply add a port forwarding rule for port 80 to the IP of your server.

                    so in Firewall menu select NAT, then create a new rule under the Port Forwarding tab
                    Set these settings:
                    interface -> WAN
                    Protocol -> TCP
                    Destination -> WAN Address
                    Destination Port Range -> HTTP (port 80)
                    Redirect Target IP -> 192.168.1.100
                    Filter Rule Association -> Create Associated Filter rule

                    other stuff can I think be left as default.

                    And that should be it…. It's just a simple port forward operation really, unless I'm misreading something.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.