Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NAT Cannot Transfer Data

    Scheduled Pinned Locked Moved NAT
    4 Posts 2 Posters 852 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      asistio04
      last edited by

      HI Pfsense Community, i am having a bit of trouble in transferring Data through outside the network,

      i already set up a NAT with Biometrics we can now access the Webpage of the biometrics but the problem is We Can't Transfer Data from the Biometrics with the one we are using with the application

      Please Take time to see the screenshot of my settings
      NT1.jpg
      NT1.jpg_thumb
      NT2.jpg
      NT2.jpg_thumb

      1 Reply Last reply Reply Quote 0
      • M
        muswellhillbilly
        last edited by

        What are your firewall rules? And how are you transferring data - via HTTP, Telnet or are you trying to use some other data transfer method?

        1 Reply Last reply Reply Quote 0
        • A
          asistio04
          last edited by

          @muswellhillbilly:

          What are your firewall rules? And how are you transferring data - via HTTP, Telnet or are you trying to use some other data transfer method?

          This is My Firewall Rule's i have tried looking for the port that our biometrics is using it uses port 23,

          GLOBE is my WAN
          PLDT is my WAN2
          OFFICE is my Network

          Nt3.jpg
          Nt3.jpg_thumb

          1 Reply Last reply Reply Quote 0
          • M
            muswellhillbilly
            last edited by

            Have you tried running a telnet from outside to your external IP (Globe) to see if you can connect to port 23? Also, might be worth checking the default gateway you've set on 172.16.0.1 - make sure it's pointing to the PFS, otherwise your outbound traffic won't route back out successfully.

            I'm also not sure what the second rule down is supposed to accomplish.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.