Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Switching from Sonicwall NSA 4600 to a pfsense box

    Scheduled Pinned Locked Moved General pfSense Questions
    15 Posts 3 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pjaneiro @DaddyGo
      last edited by

      @daddygo Hmm, not sure if I understand your post here, My post is about needing help trying to decipher what portions of the sonicwall nat rules are relevant to PFSense

      DaddyGoD 1 Reply Last reply Reply Quote 0
      • DaddyGoD
        DaddyGo @pjaneiro
        last edited by

        @pjaneiro said in Switching from Sonicwall NSA 4600 to a pfsense box:

        what portions of the sonicwall nat rules are relevant to PFSense

        Okay, ALL because NAT rules donโ€™t depend on what device you're applying to

        if you need them you need to set them up

        Cats bury it so they can't see it!
        (You know what I mean if you have a cat)

        1 Reply Last reply Reply Quote 0
        • P
          pjaneiro
          last edited by

          Bump Bump, just checking to see if anyone here has experience in this and has actual insight

          DaddyGoD 1 Reply Last reply Reply Quote 0
          • DaddyGoD
            DaddyGo @pjaneiro
            last edited by

            @pjaneiro said in Switching from Sonicwall NSA 4600 to a pfsense box:

            anyone here has experience in this and has actual insight

            nothing serious happened

            Everyone wants to get the job done easily, okay. ๐Ÿ˜‰
            In this case, you need to do it manually, sorry.

            NAT is NAT, wherever it is set up...
            (so anyone who deals with firewalls or routing must have an insight into this)

            I would do, -examine and collect the predefined NAT rules of the stupid Sonicwall one by one.
            I would then create it in "edible" form in pfSense.

            There is no better way and I know there will be a lot of work.

            I am with you in spirit, if you need help when you activate them (NAT rules) with pfSense, you can find us here.

            Cats bury it so they can't see it!
            (You know what I mean if you have a cat)

            P 1 Reply Last reply Reply Quote 0
            • P
              pjaneiro @DaddyGo
              last edited by

              @daddygo

              Not wanting to get the job done for me or easily, I'm asking for help in transcoding what means what

              like you wrote -

              I would do, -examine and collect the predefined NAT rules of the stupid Sonicwall one by one.
              I would then create it in "edible" form in pfSense.

              This is what I am trying to do, but on the pfsense half the crap on the sonicwall is not there
              source original - source translated / destination original - destination translated

              If i look on the pfsense, if i try to match those rules, nothing works, so if there is a table somewhere where there are comparable rules that have been translated from a sonicwall to a pfsense that would be awesome and i'll be able to do the rest

              S 1 Reply Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @pjaneiro
                last edited by

                Here's an example for HTTPS:
                e5d00209-5462-4633-b840-48f3bb821833-image.png
                By default pfSense creates a firewall rule allowing the traffic ("Filter rule association" at the bottom of the page).

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote ๐Ÿ‘ helpful posts!

                P 1 Reply Last reply Reply Quote 0
                • DaddyGoD
                  DaddyGo
                  last edited by

                  @pjaneiro said in Switching from Sonicwall NSA 4600 to a pfsense box:

                  nothing works, so if there is a table somewhere where there are comparable rules that have been translated

                  Hi,

                  No one can do more for you than that, everyone learned pfSense from this book ๐Ÿ˜‰
                  https://docs.netgate.com/pfsense/en/latest/nat/index.html

                  Of the Youtube stuff, I only recommend him:
                  https://www.youtube.com/watch?v=eb1pTs7XamA

                  of course:
                  https://www.youtube.com/channel/UC3Cq2kjCWM8odzoIzftS04A/videos

                  There are no explicit migration tool or instructions from Sonicwall to pfSense, or I have never met one...

                  Cats bury it so they can't see it!
                  (You know what I mean if you have a cat)

                  1 Reply Last reply Reply Quote 0
                  • P
                    pjaneiro @SteveITS
                    last edited by pjaneiro

                    @steveits I'm looking at what you highlighted

                    And this is where I get really confused, All my rules and port forwarding are done

                    so my issue is what goes where here when I look at one set of my sonicwall rules for one of my services

                    c59aa36b-8d9e-49db-a966-462228f04e98-image.png

                    this is where I do not quite grasp where what goes where

                    53743357-775a-4e03-830c-16314a1eef57-image.png

                    Since I do not transform my services (ports) I don't need worry about that

                    And I also know that rule that starts with firewalled subnets is the loopback rule, but that also confused the heck outta me, Is a loopback rule necessary for pfsense ?

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      SteveITS Galactic Empire @pjaneiro
                      last edited by

                      Are you trying for inbound NAT redirection (RouterWAN:443 -> WebServerLAN:443) or outbound NAT? Those are very different and your screen cap is for outbound. Outbound makes the outgoing packet use a different IP address, useful for instance if one has 1:1 NAT mapping and the outbound connection should use that IP not the default IP.

                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                      Upvote ๐Ÿ‘ helpful posts!

                      P 1 Reply Last reply Reply Quote 0
                      • P
                        pjaneiro @SteveITS
                        last edited by

                        @steveits

                        Basically I have about 40 ip wan adresses, let's say someone from the outside is hitting one of my public servers at 2.2.2.2, pfsense should know that when wan IP 2.2.2.2 receives a packet it should be redirected to internal private ip 10.1.1.1 and when private ip 10.1.1.1 answer back the outside world should see that 2.2.2.2 is answering and not my firewall that has an ip of 2.2.2.7

                        Am i writing this ok or did i screw the pooch i my explanation ?

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          SteveITS Galactic Empire @pjaneiro
                          last edited by

                          You're OK. So inbound would likely be 1:1 NAT then.

                          Our setup is old, but for Outbound probably either Hybrid or Manual with a manual entry for each server:

                          Source: 10.1.1.1/32
                          Destination: any (the Internet)
                          NAT Address: 2.2.2.2

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote ๐Ÿ‘ helpful posts!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.