Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cannot NAT trough OPT1 interface on multiwan

    2.2 Snapshot Feedback and Problems - RETIRED
    18
    49
    16.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mattbunce
      last edited by

      I still can't seem to get this working on the 17th October, 11:27:45 version.

      Have you had a chance to try it out ermal? Perhaps I am not configuring the Nat and Rules pages correctly?

      M

      1 Reply Last reply Reply Quote 0
      • M
        mikeisfly
        last edited by

        This is not working for me and I'm using 2.2-BETA (amd64) built on Fri Oct 17 20:02:23 CDT 2014 FreeBSD 10.1-RC2

        I have attached my LAN, NAT (Port Forwrd), Manual Outbound NAT Rules.

        I have also captured packets on both my WAN, WAN2 and LAN interfaces. On my WAN2 and LAN I can see the Syn, and the Syn Ack packets however I don't see the ack packet. Also there are some retransmissions. When I capture packets on my WAN and filter for port 32400 the capture is blank which tells me that the packet is not being sent out the default gateway. I have attached the .pcap files here in the form of a .txt file if you would like to look at them in wireshark the extension just needs to be changed back to .pcap . Hope this helps

        Thanks,

        P.S. Not sure why I was trying to embed these images from my onedrive folder but it didn't seem to work so I had to add attachments.

        ![LAN Rule.png](/public/imported_attachments/1/LAN Rule.png)
        ![LAN Rule.png_thumb](/public/imported_attachments/1/LAN Rule.png_thumb)
        ![Nat Port forward.png](/public/imported_attachments/1/Nat Port forward.png)
        ![Nat Port forward.png_thumb](/public/imported_attachments/1/Nat Port forward.png_thumb)
        ![outbound Nat.png](/public/imported_attachments/1/outbound Nat.png)
        ![outbound Nat.png_thumb](/public/imported_attachments/1/outbound Nat.png_thumb)
        [capture on LAN.txt](/public/imported_attachments/1/capture on LAN.txt)
        [capture on wan2.txt](/public/imported_attachments/1/capture on wan2.txt)

        1 Reply Last reply Reply Quote 0
        • W
          Wolf666
          last edited by

          I think my problem is the same.
          If someone has some spare time to read: https://forum.pfsense.org/index.php?topic=82944.0

          I am running:

          Version 2.2-BETA (amd64)
          built on Fri Oct 17 20:02:23 CDT 2014
          FreeBSD 10.1-RC2

          I am available to test any solution and report back.

          Modem Draytek Vigor 130
          pfSense 2.4 Supermicro A1SRi-2558 - 8GB ECC RAM - Intel S3500 SSD 80GB - M350 Case
          Switch Cisco SG350-10
          AP Netgear R7000 (Stock FW)
          HTPC Intel NUC5i3RYH
          NAS Synology DS1515+
          NAS Synology DS213+

          1 Reply Last reply Reply Quote 0
          • M
            mikeisfly
            last edited by

            It's a known bug and the developers are working on it. Until then if this is a deal breaker you can try going back to 2.1.5 until the issue is resolved. That is what I'm doing.

            1 Reply Last reply Reply Quote 0
            • S
              stewgoin
              last edited by

              I'm seeing the same issues on the current snapshot – I've worked around the issue with some sourcerouting and having an upstream system on one of the WAN links handle NATting for now. That works (firewall rules forcing a gateway, then having manual NAT rules disabling NAT).

              It looked like using firewall rules to force the alternate gateway would make the multiWAN NAT rules start working correctly, but I didn't test that yet. It definitely adds another layer of config management to do this, so I eagerly await having this one squished :)

              1 Reply Last reply Reply Quote 0
              • C
                cmb
                last edited by

                Don't change anything on your system trying to fix this, it's part of the packet filter that's currently broken in snapshots. It's slightly more correct now, as reply-to does at least return route correctly. But it's sending traffic with broken checksums, which still leaves it broken. Ermal's heading home from our hackathon in a few hours. He'll fix that when he gets back home later in the week.

                1 Reply Last reply Reply Quote 0
                • S
                  stewgoin
                  last edited by

                  @cmb:

                  Don't change anything on your system trying to fix this, it's part of the packet filter that's currently broken in snapshots. It's slightly more correct now, as reply-to does at least return route correctly. But it's sending traffic with broken checksums, which still leaves it broken. Ermal's heading home from our hackathon in a few hours. He'll fix that when he gets back home later in the week.

                  It's just a little portion of the old home network, and thankfully the changes are easy backed out to test any fixes :)

                  Thanks a ton for the feedback that it's being worked on, aside from this particular snag, 2.2 is looking stellar for my usage.

                  1 Reply Last reply Reply Quote 0
                  • M
                    mattbunce
                    last edited by

                    @stewgoin:

                    Thanks a ton for the feedback that it's being worked on, aside from this particular snag, 2.2 is looking stellar for my usage.

                    Agreed - I'm new to pfSense, but I'm very impressed with the speed of development and the "get it right in the GUI" approach. I've been using OpenWRT for a few years and there is a real tendency to push any advanced configuration to the command line, leaving much of your intricate configuration hidden within the GUI. I think the approach pfSense takes seems much more sensible - right down for the meaningful descriptions of all parameters in within the GUI

                    1 Reply Last reply Reply Quote 0
                    • M
                      mattbunce
                      last edited by

                      @cmb:

                      Ermal's heading home from our hackathon in a few hours. He'll fix that when he gets back home later in the week.

                      Hi Ermal - have yo had a chance to take a look at this yet?

                      M

                      1 Reply Last reply Reply Quote 0
                      • E
                        eri--
                        last edited by

                        Please test next coming snapshot.

                        1 Reply Last reply Reply Quote 0
                        • C
                          cmb
                          last edited by

                          This works for me on IPv4 now with a kernel Ermal built with the fix that'll be in the next round of snapshots. Hopefully next snapshot run will be good (first one from the 30th should have it).

                          1 Reply Last reply Reply Quote 0
                          • M
                            mattbunce
                            last edited by

                            Thanks Ermal - Everything seems to be working great now :)

                            1 Reply Last reply Reply Quote 0
                            • C
                              cmb
                              last edited by

                              IPv4 is fixed here, still an issue with IPv6 and TCP but all the common cases confirmed working with today's snapshot.

                              1 Reply Last reply Reply Quote 0
                              • F
                                FisherKing
                                last edited by

                                IP4 is working for me now also.  Thank you!

                                1 Reply Last reply Reply Quote 0
                                • A
                                  athurdent
                                  last edited by

                                  @cmb:

                                  IPv4 is fixed here, still an issue with IPv6 and TCP but all the common cases confirmed working with today's snapshot.

                                  I can confirm the issue with IPv6, but ICMP does not seem to work in my case. The rule below used to work on my 2.1 install. I have migrated my old config to a 2.2 test machine.

                                  Screenshot.png
                                  Screenshot.png_thumb

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    cmb
                                    last edited by

                                    @athurdent:

                                    I can confirm the issue with IPv6, but ICMP does not seem to work in my case. The rule below used to work on my 2.1 install. I have migrated my old config to a 2.2 test machine.

                                    That's route-to, not reply-to. I'll check that, I'm not aware of any issues there, but that type of scenario isn't as widely used with v6 as with v4.

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      athurdent
                                      last edited by

                                      Ah, sorry, I have set this up a long time ago and forgot to mention that there actually is NAT involved. The setup is a workaround to be able to use 2 IPv6 gateways described here:
                                      https://forum.pfsense.org/index.php?topic=71293.msg402861#msg402861
                                      But it was working OK on 2.1. ;) Anyway, thanks for looking into this and if someone has a better idea, feel free to revive that old thread.

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        mikeisfly
                                        last edited by

                                        Just another testimonial over here. WAN2 working fine now. I'm not using IPv6 as of yet but will deploy to track development PfSense 2.2 Beta. I'm currently running the snapshot dated Nov 1 64bit.

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          eri--
                                          last edited by

                                          IPv6 should be fixed on new snapshots as well.

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            athurdent
                                            last edited by

                                            Works fine now, even with my strange IPv6 NAT config mentioned earlier. Thanks!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.