Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Basic out-going NAT isn't working

    Scheduled Pinned Locked Moved NAT
    30 Posts 7 Posters 5.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Is traffic flowing through the firewall?  Without states there is either no traffic or something really wrong..  I would would do a clean install to be honest.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • R
        rubinho
        last edited by

        @johnpoz:

        Is traffic flowing through the firewall?

        No, it work only the services, are directly connected on the WAN interface, such as squid, ipsec, ovpn etc…

        @johnpoz:

        Without states there is either no traffic or something really wrong..

        Yes i know :D

        @johnpoz:

        I would would do a clean install to be honest.

        Thats the Problem
        It is a new clean install. I have reinstalled the latest version of pfSense (2.1.5 live-install x64), once on an APU and once on an  NF9D-2550 board… both the same result.
        As soon as I set on manual NAT and make a restart, NAT doesn't work anymore.

        I have now the v2.1.4 installed on my APU, and there it works with manual NAT. I don't know why ?!

        [Pfsense 2.4] Supermicro A1SRI-2558F@Atom C2558 4Gb RAM
        [Pfsense 2.4] Jetway NF9D@Atom D2550 + AD3INLAN-G Expansioncard  (3x Intel 82541PI Gigabit Controller)

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          well seems your doing the nats wrong..  lets see these nats your doing.

          so it works if you have auto nats out of the box on a clean install?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • R
            rubinho
            last edited by

            If I do a clean install, Auto NAT works.
            Because, when I switch from Auto-NAT to manual NAT and let the auto settings, add a manual rule and make a restart, has NAT stopped working.

            2.1.4 everything runs without any problems, but under 2.1.5 with the same mappings, NAT stops (after reboot)

            By the way, i have an Alix with 2.1.5 nano-bsd image, there manual NAT runs without problems  :o

            Here a screenshot of a mapping without Multiwan.

            pfsense3.jpg_thumb
            pfsense3.jpg

            [Pfsense 2.4] Supermicro A1SRI-2558F@Atom C2558 4Gb RAM
            [Pfsense 2.4] Jetway NF9D@Atom D2550 + AD3INLAN-G Expansioncard  (3x Intel 82541PI Gigabit Controller)

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              So its working with the auto, even switched to manual.. But when "add a manual rule and make a restart, has NAT stopped working."

              So what are you adding - clearly this is what is breaking it.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • K
                kejianshi
                last edited by

                To me this outbound NAT looks strange.  I don't see how it could work well.  I'd expect everything to exit over wan_kdg with these setting.

                1 Reply Last reply Reply Quote 0
                • R
                  rubinho
                  last edited by

                  ???

                  Guys, i have only to add one rule, the system itself has created all other rules ?!

                  What should be wrong?

                  [Pfsense 2.4] Supermicro A1SRI-2558F@Atom C2558 4Gb RAM
                  [Pfsense 2.4] Jetway NF9D@Atom D2550 + AD3INLAN-G Expansioncard  (3x Intel 82541PI Gigabit Controller)

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Why do you have same source network on 2 different interfaces? 172.20/16  And then your openvpn network overlaps with that?

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • R
                      rubinho
                      last edited by

                      The Ovpn interface (HideMyAss) can be seen as a WAN interface and the LAN Device going depending on the Firewall Rule either over WAN_KDG or Hidemyass

                      [Pfsense 2.4] Supermicro A1SRI-2558F@Atom C2558 4Gb RAM
                      [Pfsense 2.4] Jetway NF9D@Atom D2550 + AD3INLAN-G Expansioncard  (3x Intel 82541PI Gigabit Controller)

                      1 Reply Last reply Reply Quote 0
                      • K
                        kejianshi
                        last edited by

                        johnpoz  - Thats my question.  Its possible my understanding of outbound NAT is broken.
                        But to me it seems this set of rules wont work well.

                        1 Reply Last reply Reply Quote 0
                        • W
                          Wolf666
                          last edited by

                          @kejianshi:

                          johnpoz  - Thats my question.  Its possible my understanding of outbound NAT is broken.
                          But to me it seems this set of rules wont work well.

                          They will not work.

                          You have 2 rules passing traffic on both WAN_KDG and HYDEMYASS from 172.20.0.0/16 and having the default gateway. The first condition matching the rule will be processed, it means that the one on HYDEMYASS will never be processed.

                          If my understanding of Outbound NAT is correct.

                          Modem Draytek Vigor 130
                          pfSense 2.4 Supermicro A1SRi-2558 - 8GB ECC RAM - Intel S3500 SSD 80GB - M350 Case
                          Switch Cisco SG350-10
                          AP Netgear R7000 (Stock FW)
                          HTPC Intel NUC5i3RYH
                          NAS Synology DS1515+
                          NAS Synology DS213+

                          1 Reply Last reply Reply Quote 0
                          • S
                            Supermule Banned
                            last edited by

                            It is. First come, first served.

                            1 Reply Last reply Reply Quote 0
                            • R
                              rubinho
                              last edited by

                              unless you use a firewall rule …..  ;)

                              example:
                              http://vdupain.wordpress.com/2013/09/24/configurer-un-client-openvpn-vers-hidemyass-hma-sous-pfsense/

                              pfsense4.jpg
                              pfsense4.jpg_thumb

                              [Pfsense 2.4] Supermicro A1SRI-2558F@Atom C2558 4Gb RAM
                              [Pfsense 2.4] Jetway NF9D@Atom D2550 + AD3INLAN-G Expansioncard  (3x Intel 82541PI Gigabit Controller)

                              1 Reply Last reply Reply Quote 0
                              • K
                                kejianshi
                                last edited by

                                Yes - You can do it with a firewall rule.  Those are also first come first served.

                                I wouldn't try doing it in two places though.  Pick one.

                                1 Reply Last reply Reply Quote 0
                                • R
                                  rubinho
                                  last edited by

                                  So I do not know what you want.

                                  "DUAL" NAT works at the same time. Tested in 2.1.4

                                  psctl -s state | grep 172.20.111.13
                                  ovpnc5 icmp 172.20.111.13:1 -> 10.200.1.4:43502 -> 8.8.4.4      0:0
                                  re1 icmp 172.20.111.13:1 -> 92.99.22.149:61907 -> 8.8.8.8      0:0

                                  [Pfsense 2.4] Supermicro A1SRI-2558F@Atom C2558 4Gb RAM
                                  [Pfsense 2.4] Jetway NF9D@Atom D2550 + AD3INLAN-G Expansioncard  (3x Intel 82541PI Gigabit Controller)

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    I have all my NAT here at home set up the same way.  Using a failover gateway group of WAN (cable) and DSL.  Works perfectly (2.1.5).  OP should be able to send outbound traffic to either gateway using policy routing and it should catch the correct NAT rule.

                                    rubinho what are the firewall rules and gateways / gateway groups set up like?

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • R
                                      rubinho
                                      last edited by

                                      At the moment i have no failover WAN , only one gateway rule for a separate proxy that goes over VPN (HideMyAss).

                                      I must first take my Voipserver running before I plug in my second WAN into pfsense

                                      [Pfsense 2.4] Supermicro A1SRI-2558F@Atom C2558 4Gb RAM
                                      [Pfsense 2.4] Jetway NF9D@Atom D2550 + AD3INLAN-G Expansioncard  (3x Intel 82541PI Gigabit Controller)

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.