Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Faulty documentation on Port Forwarding??

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kjemison
      last edited by

      Hello,

      A simple project - forward all traffic to ports 443 and 8080 to an internal server.

      Internal IP scans verify that the ports are open.

      Followed PFSense instructions to forward ports.

      Go to FIREWALL -> NAT

      Verify PORT FORWARD is selected

      Click on PLUS sign to add a new entry

      DISABLE RULE and No RDR - Not checked

      Interface - WAN

      Protocol - TCP/UDP

      SOURCE - Any

      Source Port Range - 8080

      Destination Port Range - 8080

      Redirect Target IP - 192.168.4.20

      Redirect Target Port - 8080

      XMLRPC - not checked

      NAT Reflection - not checked

      Filter RULE Add - yes to automatically create a firewall rule

      SAVE

      APPLY

      End..

      Scan for open port from my outside IP address (static) and the port shows closed…

      I have removed and added this port forward several times... slowly and methodically based on instructions given by PFSense docs and it still does not work.

      This should have taken 5 minutes to accomplish and now it has been hours.

      Anyone to help out a little would be greatly appreciated.... PFSense moderators possibly?

      Thank you for any help you can give

      1 Reply Last reply Reply Quote 0
      • M
        markn62
        last edited by

        Change source port to "any".

        1 Reply Last reply Reply Quote 0
        • K
          kjemison
          last edited by

          Checked for Source Port - ANY … verified and re-scanned ... no luck on open ports for 443 or 8080...

          1 Reply Last reply Reply Quote 0
          • M
            markn62
            last edited by

            When you created your NAT rule did you have Filter rule association set to "Rule NAT"?  In other words, what are the parameters of the rule that was created in the WAN tab after you created the NAT rule?

            The associated WAN rule to your NAT should be IPv4 TCP/UDP, *, *, 192.168.4.20, 8080, *, none, blank.

            1 Reply Last reply Reply Quote 0
            • K
              kjemison
              last edited by

              WAN Rule is as follows:

              PROTO - TCP/UDP

              SOURCE *

              PORT *

              DESTINATION - 192.168.4.20

              PORT - 8080

              GATEWAY *

              QUEUE - None

              SCHEDULE - Blank

              1 Reply Last reply Reply Quote 0
              • M
                markn62
                last edited by

                Looks like your rules are correct, should work.  So a port scan on the LAN reveals 192.168.4.20:8080 open and a remote scan of your WAN adapter doesn't show port 8080 open, is that correct?

                Presume you don't have another port 8080 rule or a rule that in some way conflicts with these rules.  You might also try going to STATES and reset your states, then rescan the Wan port.

                1 Reply Last reply Reply Quote 0
                • K
                  kjemison
                  last edited by

                  You are correct on the LAN scan results are positive and WAN scan is negative (port not open)… I will look for STATES ... Must be part of the Web interface tabs... :)

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    and is it possible that 8080 is blocked inbound to your wan.. Is your wan behind a NAT?  quite often I find users put pfsense behind a NAT.. either because their "modem" as they call them doesn't allow bridge mode.. Or they don't know any better.. And wonder why their forwards don't work.

                    Does your pfsense wan start with public IP, or 192.168.x.x, 10.x.x.x or 172.16-31.x.x – if so its behind a NAT and you will have to forward 8080 on that device to your pfsense wan IP.

                    Its also possible your isp blocks 8080 - this is a common alternative port for http, as well as common port for proxy, etc.

                    I would do a sniff on your pfsense wan - generate some traffic to your port from outside.. Do you see it? If not its being blocked upstream from pfsense or your not hitting the correct public IP, etc.

                    You are correct it should take all of about 30 seconds to create a forward.

                    Real easy way to generate traffic from outside is canyouseeme.org

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • K
                      kjemison
                      last edited by

                      Hello,

                      NOTE** - The desired port is 443 - My bad earlier posting 8080 – Sorry

                      The PFSense does not start with a WAN and therefore I know it is just a public IP on the outside.

                      I have reloaded the PFSense firewall, created the NAT and it generated the Rule.

                      I just do not understand why this is so difficult...The customer MUST have this operational by tonight!

                      Current config:

                      Router Internal address structure: 192.168.1.1 / 20 (255.255.240.0)

                      Machine IP that has the service running - 192.168.4.20

                      NAT Config - WAN, TCP, * , * , WAN Address, 443, 192.168.4.20, 443 (HTTPS)

                      I can ping, and connect to the 192.168.4.20 system from a workstation that is 192.168.1.x
                      My subnetting is fine based on that.
                      Any ideas????

                      Thank you

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        And again – have you verified the traffic actually hits your wan?  It takes 2 freaking seconds to do..  Until you know the packets are getting to pfsense.. There is nothing to do.

                        A /20 for lan -- really?  Why?  That is just going to be a broadcast nightmare..

                        And what does english have to with 8080 or 443 -- you clearly stated you needed both!  So again validate the traffic gets there no matter what port you need.

                        And lets not forget host firewalls?  It quite common for host firewall to allow traffic from internal network ie your 192.168.1.0/20 but not from external network.  And then traffic even if forwarded from pfsense to your lan box would be shown as closed because your host firewall did not allow it.

                        Follow the packets - validate hits your wan, then validate that it leaves your lan, then validate it hits your lan box..  This troubleshooting takes all of 30 seconds.  Until you do this your just what??  Spinning your wheels.  A port forward in pfsense is literately click click..  And if it takes more than 30 seconds to do there is something wrong - when there is something wrong, what do you do??  You troubleshoot it ;)

                        https://doc.pfsense.org/index.php/Port_Forward_Troubleshooting

                        validateport.png
                        validateport.png_thumb

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • K
                          kjemison
                          last edited by

                          I know the traffic hits my WAN due to the fact that the router that we removed was passing traffic to the desired host before it crapped out.

                          No ports are being forwarded

                          Host firewall is not turned on as verified by the first statement.

                          You are correct that it should be click, click, click to set this up.

                          To get the customer up and running I went out and purchased a Netgear FVS318, put it on the network, click, click, click and the ports are now forwarding correctly…. 5 minutes from open the box to working.

                          This is not what I want as the FVS318 caps the speed at 18Mbps for download from the ISP... this is just temporary until I can get the PFSense to work correctly. With the PFSense the customers ISP connection is fully utilized at 75Mbps.

                          So, now that we have verified that the traffic is hitting the WAN and able to get to the host at 192.168.4.20 and the ports are active.... any other ideas of why PFSense will not work correctly?

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            "I know the traffic hits my WAN due to the fact that the router that we removed was passing traffic to the desired host before it crapped out."

                            That is not validation by any means of the imagination..

                            I have linked you to the troubleshooting guide - I would suggest you follow it.  So did you enable logging on your rule?  Do you see that traffic being allowed or denied?

                            –
                            3. If you're still having problems, edit the firewall rule that passes traffic for the NAT entry, and enable logging. Save and Apply Changes. Then try to access it again from the outside. Check your firewall logs to see if the traffic shows as being permitted or denied.

                            How did you set the lan IP to /20 -- when you first setup or after?  Are you using automatic or manual outbound nats?

                            Let see your firewall rules and nat rules - do you have something before your firewall or nat?  That could be causing an issue - post your rules!

                            Are you listening on the ports you want to forward with something else - like the webgui via 443?  Or openvpn setup to listen on 443?

                            How about simple test with just /24 as your network?

                            So is internet working from this client your trying to forward to via pfsense?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • G
                              georgeman
                              last edited by

                              WAN rules? Do you have any block rule on WAN? Seriously, this shouldn't be hard to troubleshoot, there aren't many points of failure

                              If it ain't broke, you haven't tampered enough with it

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.