Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Need to put PFSense behind a NAT and double nat, looking for config recommendations to mitigate issues.

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 3 Posters 2.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      gawainxx
      last edited by

      I've been having ongoing issues with my setup, as discussed in https://forum.netgate.com/topic/155911/wan-interface-stops-working-every-few-days/50 .

      As one of my final troubleshooting efforts, I'm going to place Pfsense behinf the ISP provided router so that I can rule out whether It's a pfsense issue. By using the ISP provided modem I'd be taking handling the PPPOE handling away from pfsense as well as have an escalation path with the ISP if needed.

      Unfortunately, my network layout and configuration is too complicated to have everything on a single, untagged VLAN and will need to double nat for a bit.

      I'm likely going to need to forward VPN and some other ports from the ISP router to PFsense, are there any specific configuration changes I could make to psuedo DMZ the pfsense firwall, while still having it behind the ISP router while allowing the ISP router to act as a gateway and be accessible via it's IP address?

      A 1 Reply Last reply Reply Quote 0
      • A
        akuma1x @gawainxx
        last edited by

        @gawainxx Lots of ISP modems have a "DMZ" feature. You could use this, if available, since it will pass ALL (or most) ports right into the pfsense WAN port. Once there, you can deal with the pfsense box doing the port forwarding, like it was at the edge of your network.

        Jeff

        G 1 Reply Last reply Reply Quote 0
        • G
          gawainxx @akuma1x
          last edited by

          @akuma1x said in Need to put PFSense behind a NAT and double nat, looking for config recommendations to mitigate issues.:

          @gawainxx Lots of ISP modems have a "DMZ" feature. You could use this, if available, since it will pass ALL (or most) ports right into the pfsense WAN port. Once there, you can deal with the pfsense box doing the port forwarding, like it was at the edge of your network.

          Jeff

          Should I still be able to access the management interface of the modem/router?

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            Yeah you should be able too.. Might will want to turn off the default rfc1918 wan block rule.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            G 1 Reply Last reply Reply Quote 0
            • G
              gawainxx @johnpoz
              last edited by gawainxx

              @johnpoz

              So far so good, I've not had an opportunity to verify whether the port forwarding for openVPN is working correctly in the DMZ, i'll be checking that shortly and seeing whether I need to define that in the modem port forwarding as well.

              Yep, also created a rule on the client interface so that I can access the modem's webui 0c0cc63f-b7d2-4a15-ba9e-e7d73d47289e-image.png

              1 Reply Last reply Reply Quote 0
              • G
                gawainxx
                last edited by

                port forwarding looks good, was able to connect to OpenVPN on celluar..

                Going to run like this for a bit.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz

                  Why would you be blocking bogon on your lan side interfaces? That makes no sense.. How would something with a bogon be on your lan side? And even if allowed, where exactly do you think it could get to? It wouldn't be natted, since its not the interfaces network...

                  Also what is the point of the block IPv6? If not allowed its blocked by default. That rule doesn't do anything.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  G 1 Reply Last reply Reply Quote 0
                  • G
                    gawainxx @johnpoz
                    last edited by gawainxx

                    @johnpoz said in Need to put PFSense behind a NAT and double nat, looking for config recommendations to mitigate issues.:

                    Why would you be blocking bogon on your lan side interfaces? That makes no sense.. How would something with a bogon be on your lan side? And even if allowed, where exactly do you think it could get to? It wouldn't be natted, since its not the interfaces network...

                    Also what is the point of the block IPv6? If not allowed its blocked by default. That rule doesn't do anything.

                    That my WAN IF in the screenshot I have ipv4 traffic from the centurylink modem allowed and all other rfc1918 blocked.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      Then none of those rules really make sense.. You have no port forwards.. Blocking bogon only makes any sense if your actually have a port forward, and you want to stop some noise from hitting it..

                      You hitting your router in front of pfsense at some 192.168.0.1 address has nothing to do with the wan rules. You would really only need to turn off rfc1918 rules if you had devices on this network between your router and wan that you would like to get to stuff behind pfsense via a port forward.

                      I guess the ipv6 stuff stop logging of ipv6 traffic hitting your wan from being logged in the default block log.

                      port forwarding looks good, was able to connect to OpenVPN on celluar..

                      To where you have no rules that allow access to openvpn ports listed if that is your wan.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      G 1 Reply Last reply Reply Quote 0
                      • G
                        gawainxx @johnpoz
                        last edited by gawainxx

                        @johnpoz said in Need to put PFSense behind a NAT and double nat, looking for config recommendations to mitigate issues.:

                        Then none of those rules really make sense.. You have no port forwards.. Blocking bogon only makes any sense if your actually have a port forward, and you want to stop some noise from hitting it..

                        You hitting your router in front of pfsense at some 192.168.0.1 address has nothing to do with the wan rules. You would really only need to turn off rfc1918 rules if you had devices on this network between your router and wan that you would like to get to stuff behind pfsense via a port forward.

                        I guess the ipv6 stuff stop logging of ipv6 traffic hitting your wan from being logged in the default block log.

                        It's dmz'd so to my understanding that means that it's essentially directly accessible on the wan, which matches the traffic I'm seeing in the filter logs. I'm able to directly access VPN on the pfsense firewall externally without any port forwarding set up on the ISP modem.
                        I may be mistaken as this is my first interaction with DMZ but from what I can see those rules are needed in this case?

                        The openvpn rules are there, just deliberately cut off from the screenshot.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by johnpoz

                          @gawainxx said in Need to put PFSense behind a NAT and double nat, looking for config recommendations to mitigate issues.:

                          access VPN on the pfsense firewall externally without any port forwarding set up on the ISP modem.

                          Yeah the isp modem would send traffic into pfsense wan IP if you put that in the dmz setting on your ISP... But you have NOT rule to allow vpn access.. So how would you actually get to pfsense wan IP.

                          The openvpn rules are there, just deliberately cut off from the screenshot.

                          Then how would anyone be able to evaluate your rules? Which is why you should always show which interface the rules are from, and show the bottom of the rule list so you can actually tell that is all of them.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          G 1 Reply Last reply Reply Quote 0
                          • G
                            gawainxx @johnpoz
                            last edited by

                            @johnpoz
                            Good point
                            fe007b75-e0f4-455c-bc76-2bf05cece0ca-image.png

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.