Migration to pfsense completed, but have a few questions regarding nat..

  • Dear all,

    I have just successfully migrated my firewall from ipcop to pfsense 1.2 (running on alix). Everything when smoothly. My setup is:

    WAN: x.y.z.194 (with VIP of x.y.z.195 - 198)

    Under DMZ, i have few servers -

    x.y.z.194 in running NAT with port forward to dmz server ip is running on linux (web, mail, named, dns). The dns is being used for internal lan/dmz and to bind domain name.

    The setup that i have done is.


    Proto  Source  Port  Destination  Port  Gateway  Schedule  Description

    • LAN net      *                 *           *               *                           Default LAN -> any

    TCP/UDP      *            *  53 (DNS)      *                              DNS

    TCP/UDP  DMZ net  53 (DNS)  *          53 (DNS)      *                              DNS server

    I have setup outbount NAT

    Interface  Source  Source Port  Destination  Destination Port  NAT Address  NAT Port  Static Port  Description
    WAN  *                  *                      *                    *                  *      NO                Interface Address
    WAN  *                  *                      *                    *                  *      NO         Auto created rule for LAN 
    WAN *                 *                     *                            *                 *     NO         Auto created rule for LAN

    When i am using linux/ipcop as firewall, with ns server running on dmz the output of nslookup should be something like this

    [root@apps ~]# nslookup google.com
    Server: x.y.z.94
    Address: x.y.z.94#53

    Non-authoritative answer:

    but pfsense as a firewall the output is:

    [root@apps ~]# nslookup google.com


    Is there a way to fix this, why are it use the dmz ip and not the public ip? i have been searching the forum and tried the possible solutions that i can find but it still does not work. By the way my dns is working fine. all my domain running on the is working perfectly.

    any ideas or suggestions are welcome.