Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    (SOLVED) NAT rule for WAN port from Firewall A w/ openvpn server to device behind Firewall B w/ openvpn client

    Scheduled Pinned Locked Moved NAT
    3 Posts 1 Posters 305 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • SipriusPTS
      SipriusPT
      last edited by SipriusPT

      Hello,

      I am trying to setup a NAT rule for a WAN port from Firewall A to a device behind a Firewall B, where both Firewalls are connected with a site-to-site openvpn connection, being Firewall A the server, and Firewall B the client, but not sure why am not being able to do it till know, like I have been doing for local networks of Firewall A.

      The schematic, where in red is what I am trying to achieve through a NAT rule for a certain port:

      0b73ff92-ec74-4f73-8544-37f06f9b3a3e-image.png

      From 10.0.0.0/24 network I am able to access 10.0.10.0/24 and vice-versa without issues (including that 10.0.10.100 device and port). I am able to setup NAT rules on WAN address in Firewall A to 10.0.0.0/24 and even to other local networks there that I have not add in the schematic. In Firewall A I use Hybrid Outbound Nat mode. From

      From System > Advanced, I have setup the following options:

      c0e8b93c-0859-41ec-a5eb-3b37093c80bd-image.png

      Anyone knows what is missing out of my config?

      If you need more info I can provide without problem.

      Thanks in advance!

      1xSG-4860-1U
      1xSG-3100
      2xpfSense Virtual Machines

      1 Reply Last reply Reply Quote 0
      • SipriusPTS
        SipriusPT
        last edited by

        Connections are being received in Firewall A, and seems to point to the right machine and port:

        33932fa6-3922-42a8-ae25-d88975c626fe-image.png

        But no output for the device 31.22.x.x.

        1xSG-4860-1U
        1xSG-3100
        2xpfSense Virtual Machines

        1 Reply Last reply Reply Quote 0
        • SipriusPTS
          SipriusPT
          last edited by SipriusPT

          So, after a some CSI I notice that inbound packages where reaching the target machine, the problem was that the Firewall B didnt knew where to sent back the response, so I added a new rule in NAT Outbound for this particular device, and worked like a charm:

          0d66b8df-182e-417f-b492-f56c1d24b4d4-image.png

          NOTE: Firewall B doesnt use Firewall A gateway, its a "hybrid" VPN.

          1xSG-4860-1U
          1xSG-3100
          2xpfSense Virtual Machines

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.