Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense with double NAT

    Scheduled Pinned Locked Moved General pfSense Questions
    14 Posts 2 Posters 8.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ Online
      johnpoz LAYER 8 Global Moderator
      last edited by

      If your blocking private

      10.0.0.3:53232

      Is your source and would be blocked would it not, since its private.

      But there should be NO reason why that device can not be just a modem.. Chatting with the IDIOTS with comcast are not going to be much help ;)

      Question for you - I have comcast, are they not charging you like $7 a month for that device?  Just buy your own and like a year you are paid up with cost and after is just saving money.  I bought my own couple years back SB6120 and have not had issue one with it.  Paid for itself twice already ;)

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 25.07 | Lab VMs 2.8, 25.07

      1 Reply Last reply Reply Quote 0
      • P Offline
        punkme112
        last edited by

        Since I unchecked the Block private networks, I don't get any block's in my log for the 10.0.0.3, but I am still unable to connect to my device over port 8000.  Comcast wise, I have to use theirs because I have phone from them as well :(.  So it sort of limits my choices at the moment.

        1 Reply Last reply Reply Quote 0
        • johnpozJ Online
          johnpoz LAYER 8 Global Moderator
          last edited by

          Then you got your nat configured wrong.

          Did you not let the nat create your wan rule?

          Hmm this seems odd as well
          192.168.1.6:443 as dst on your wan interface?

          How did you forward through your TG862 via DMZ or did you setup a specific forward?

          Why are you using 8000?  Why not just 443, comcast does not block that - I use it to access openvpn on my pfsense.

          so you have to forward on TG862 to pfsense wan IP, 10.0.0.3 I believe you set it to be?  for whatever port you want.  Then on pfsense you need to forward that port to your inside box - assume the 192.168.1.6

          if your stuck doing nat because you have phone with them as well, then I would just put your pfsense wan IP in the DMZ of the thing and then you only will have to forward at pfsense for any future ports you want.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.07 | Lab VMs 2.8, 25.07

          1 Reply Last reply Reply Quote 0
          • P Offline
            punkme112
            last edited by

            This is what I was thinking.  I have been out of the Pfsense usage for awhile (I switched to a Juniper SSG5, but it was giving me issues with gaming).  Anyways, since I did the unblock of private networks, I don't have any logs as I did in the first post.  For my arris, the only things I set on that, were in its DMZ, I put my firewalls WAN IP of 10.0.0.3, and I did the same in the arris' port forwarding settings as well using the 10.0.0.3 for that port 8000.  I know this sounds kind of cryptic, if you need any screenshots or anything, Ill be glad to post them.

            1 Reply Last reply Reply Quote 0
            • P Offline
              punkme112
              last edited by

              Here is my NAT as it is now on the firewall:

              nat.PNG
              nat.PNG_thumb

              1 Reply Last reply Reply Quote 0
              • johnpozJ Online
                johnpoz LAYER 8 Global Moderator
                last edited by

                and where is your firewall wan rule that matches up with that?  And dest address should be your WAN address

                here are my nats

                wannat.png
                wannat.png_thumb

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07 | Lab VMs 2.8, 25.07

                1 Reply Last reply Reply Quote 0
                • johnpozJ Online
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Once you put the 10.0.0.3 in the DMZ you would not also forward ports on it.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07 | Lab VMs 2.8, 25.07

                  1 Reply Last reply Reply Quote 0
                  • P Offline
                    punkme112
                    last edited by

                    Here's the firewall rule:

                    nat2.PNG
                    nat2.PNG_thumb

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ Online
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      So put in your wan address as destination in your nat (this is default why did you change it to *), and verify your alias, why use alias for a private IP address?  Alias makes sense if you have a group or something, or something changes like a public fqdn that you don't have control over, etc..  But what do you have sslvpn pointing to?  Can it resolve it?  Do you have it as IP - why not just put in IP.

                      There was user back that had typo in his alias 192.163 vs 192.168 or something.

                      I would just put direct info in - this way you can see everything with one easy view of your rules vs having to look at your aliases, etc.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07 | Lab VMs 2.8, 25.07

                      1 Reply Last reply Reply Quote 0
                      • P Offline
                        punkme112
                        last edited by

                        I will give this a try.  As far as the NAT goes, when I am under the destination part, it has WAN address, but the field under it will not let me put anything in.  Should I just do single host or alias?  I appreciate the help!

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ Online
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          And how many hosts are you going to forward too?  Thats 1 right - so why do you need an alias?

                          Why do you need to put something under Wan Address - is that not going to be the destination IP??  What is normally your Public IP, or in your case 10.0.0.3 which your first router will be NAT inbound traffic to, since you put your pfsense wan IP in its DMZ.

                          No other forwards on your first router - just the DMZ setting is all that is needed.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07 | Lab VMs 2.8, 25.07

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.