Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Another wan from lan issue NAT loopback

    Scheduled Pinned Locked Moved NAT
    15 Posts 5 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      wifiuk
      last edited by

      i already had each camera on a different port using the same external no-ip.org address and works fine outside the network…

      So i have logged into my website host and set a subdomin ipcam1 and another called ipcam2.

      forwarded these to my blahblah.no-ip.org address.

      so they will always be pointing to my external ip . and changed the camera link on my phone to cam1.mywebhost:1234 and cam2.mywebhost:2345

      so now work internal and external using the Split DNS as suggested above.....

      This is a workaround tho , as NAT loopback should work correctly but it doesnt....

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        NAT reflection is an ugly hack.  Take comfort in knowing you did it right instead of easy.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          "This is a workaround tho"

          No your idea that you should send traffic from the lan side of your firewall to the public side to be forwarded back in with a source IP that came from your lan side is as stated an UGLY hack!!!

          This can cause asymmetric routing, its pretty much security concern.  So your firewall is allowing traffic when it says it came from internal private network?  Did it really, or was the source spoofed?

          So your client sends traffic to 1.2.3.4, which is off his network so he sends to gateway..  Shouldn't it be concerned that return traffic came from 192.168.1.x ??  When server at 192.168.1.x sees the inbound traffic that says it came from 192.168.1.y

          Nat reflection is hack that really shouldn't even be there..  Nobody in networking would ever expect that nat reflection should be a viable option..  Only people not knowing what they are doing would expect such a thing to be a solution.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            You know what I recommend?

            First - Never expose it directly to the internet - use a VPN.

            Second - Address it directly by IP

            Thats what I do.

            Port forwarding to a IP cam from web is begging for a hack.

            1 Reply Last reply Reply Quote 0
            • S
              siddharthm
              last edited by

              Just try nat+proxy it must do the job

              1 Reply Last reply Reply Quote 0
              • S
                siddharthm
                last edited by

                https://forum.pfsense.org/index.php?topic=86803.0

                1 Reply Last reply Reply Quote 0
                • W
                  wifiuk
                  last edited by

                  @kejianshi:

                  You know what I recommend?

                  First - Never expose it directly to the internet - use a VPN.

                  Second - Address it directly by IP

                  Thats what I do.

                  Port forwarding to a IP cam from web is begging for a hack.

                  as said earlier, my cam is locked down firstly with  a decent password, secondly i only allow my work IP, my mobile phone subnet to access the IP. all other IP trying to connect to that port is blocked by the firewall. so firstly they would need to hack the firewall before they can get to the cams.

                  2ndly, cant have VPN on all the time as i access them from work and from my phone, cant have phone on VPN all the time not practical.

                  I have a dynamic IP, so using the IP will not work as it changes from time  to time

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    Sounds like it super secure then.  Problem solved.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      "cant have phone on VPN"

                      Who said it had to be on all the the time?  It takes seconds to connect to vpn from the phone.  As to from work - again I vpn into my home network from work all the time.  Nice thing about openvpn is you can bounce off a proxy like many work networks require ;)

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • W
                        wifiuk
                        last edited by

                        oh yeah i know its easy to turn off and on, but i have a widget on my home screen, so that means i would have to have it on all the time otherwise the widgets wouldnt work, but its not a major problem.

                        And with my work, no need to bounce via proxy ..

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.