Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problems with NAT and Internet access

    Scheduled Pinned Locked Moved NAT
    14 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD Offline
      Derelict LAYER 8 Netgate
      last edited by

      A zip? Really?

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • P Offline
        pike
        last edited by

        The jpg didnt want to upload dude.

        1 Reply Last reply Reply Quote 0
        • DerelictD Offline
          Derelict LAYER 8 Netgate
          last edited by

          Just attach them. I don't know of any in zip but clicking on that crap is how people get pwnd.

          Everyone else attaches images. Figure it out.

          No idea what you're trying to do with 10.240.17.0/24 on both sides.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • johnpozJ Online
            johnpoz LAYER 8 Global Moderator
            last edited by

            You can not run the same network on both your wan and your lan??  This 10.240.17 derelict pointed out already..

            And why would you be creating vips for these other networks??  These other networks should be vlans..  You don't run different layer 3 over the same layer 2..

            How do you even get to that proxy - its on a different network than you even list on your cisco.

            Where exactly are you natting even??  both your other router and your pfsense??

            Why would you not just use a transit network to get to this other other from pfsense, and then pfsense can run whatever other networks you need on your network via vlans…

            You work for the gov of South Africa??

            inetnum:        164.146.0.0 - 164.146.255.255
            netname:        OPENET1
            descr:          Government of South Africa

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

            1 Reply Last reply Reply Quote 0
            • M Offline
              muswellhillbilly
              last edited by

              I'm with the others on this one. Interesting diagram but it makes zero sense. I can't tell where your LAN ends and your WAN begins for one thing. And it looks like your external (Gov't of S.Africa) address is defined as a loopback device!

              I'd give this some long, hard thought before reposting your network config (Yes, you will need to repost it if you want any help with this). Indicate clearly where your LAN is located and the address blocks you're using for your LAN and WAN. You can't use the same networks on both.

              1 Reply Last reply Reply Quote 0
              • P Offline
                pike
                last edited by

                Eish bro…...i wish it was that easy. So your suggestion is to incorporate vlans to pfsense??

                1 Reply Last reply Reply Quote 0
                • johnpozJ Online
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Wish what was so easy, using vlans on pfsense yes it quite simple..  Piece of cake really, takes all of like 10 seconds to create a vlan..

                  Sorry dude but its a plain simple fact, you don't just run different layer 3 networks over the same wire by just adding more IP with different masks on the interfaces..

                  And you sure and the hell do not run the same layer 3 on different sides of router/firewall..  How exactly do you think that is going to work..

                  edit:  See attached… You run your multiple networks to pfsense via vlans, or sure you could use their own physical network switches and interfaces if you want to do it like many dod or gov networks run where vlans are not enough isolation.  You then connect pfsense to your upstream router via a transit.  You most likely should be natting where your rfc1918 space actually makes transition to public space.  So guessing your cisco?

                  You create routes in the cisco to point pfsense transit network IP as gateway to get to those networks.  There you go..  If you have some proxy that hangs off your cisco - ok, your clients could use that if they wanted to..

                  typicalsetupmorethan1router.png_thumb
                  typicalsetupmorethan1router.png

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                  1 Reply Last reply Reply Quote 0
                  • P Offline
                    pike
                    last edited by

                    In your opinion…...how would you suggest i use vlans in my network???

                    1 Reply Last reply Reply Quote 0
                    • P Offline
                      pike
                      last edited by

                      @muswellhillbilly

                      Our LAN is everything behind the CISCO router.

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ Online
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        I already gave you a diagram… for how you could use vlans...  Without some actual useful drawing I could not really be more specific.

                        Why are you networks on right side of pfsense not already vlans??  You don't just add IPs to an interface and call it a day.. Sorry but whoever did that should not be getting paid to do networking support.

                        What switching infrastructure do you have?  What is the make and model of your switches??  How many interfaces does pfsense have?  You can breakout your networks with or without tagging.. So while you tag the vlans in your network, to pfsense they could be native untagged networks, etc..

                        I would be more than happy to put a diagram together if had some better understanding of your network than that mess you posted.  And again you CAN NOT expect it to work how you have it shown.. You can not put the same network on 2 sides of a router and expect it to route..  if you want to the gateway for your networks to be your cisco - you could do that too, pfsense could be just a transparent firewall, etc..

                        How you have it drawn is BROKEN!!!  You mention you have sub interfaces defined on cisco, are they not vlan tagged already?  YOu can not just create sub interfaces on cisco without using vlan..  That is broken setup... When you create the sub interface... lets call ig gi0/0.1 you would put a vlan tag on it with Encapsulation dot1q 10 for example..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ Online
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          So per our PMs - Attached is how you could test migration to pfsense and vlans

                          Your existing network is on the top part, add pfsense to one of your existing switches, pfsense would have an IP from your existing network and would use this as transit.  It would then nat to some new network you create behind pfsense, you could even create vlans here.

                          Then put some test machines behind pfsense and make sure they can use the internet.  Once that works you could just move all your stuff to these new networks..

                          testing.png
                          testing.png_thumb

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                          1 Reply Last reply Reply Quote 0
                          • P Offline
                            pike
                            last edited by

                            Currently I have my test environment setup as in your drawing.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ Online
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              And how its it going?  Where you dont use the same network on both sides and just let pfsense use its own network behind and nat?

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.