• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

New user with NAT and 1:1 problems

Scheduled Pinned Locked Moved NAT
2 Posts 2 Posters 838 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K
    Kedryn
    last edited by May 26, 2016, 4:50 PM May 26, 2016, 4:04 PM

    Hi all.
    I'm a new pfSense user, moved here from other products.
    I'm still learning how to do some of the things i was doing with the previous firewal product, but i didnt find a way to do a couple of rules i need badly.

    My setup is

    Lan: 10.0.0.0/16
    Wan: 192.168.160.0/24 (an MPLS one. I know. I didn't choose that…)
    OPT1 (another wan) 85.xxx.xxx.218

    on WAN, i have other sites using 192.168.170.0/24, 192.168.150.0/24 and 10.0.101.0/24 (again, it wasn't me who made this crap)

    now, i have some rules mapping 1:1 wan<>Lan, and those are working right, so machines on other sites are able do reach LAN ones here
    then, i have also a global dns server that resolve myfirm.priv with MPLS ips (192.168.x.x).

    What i still didnt manage do to, and was working with previous firewall software, is that when a machine in my LAN tries to access, for example, nas.myfirm.priv, that is 192.168.160.4 in the DNS, it has to be redirected to the LAN ip of the 1:1 mapped WAN addrest. For example, i was mapping outgoing  calls to 192.168.160.4, from LAN to WAN doing an 1:1NAT  to 10.0.0.4 (nas ip in LAN). How i can do the same with pfSense? No, split dns is not an option this time.

    Another thing i'm still trying to do, and its similar, is redirect calls from LAN to an external ip (for example 8.8.8.8) to another external ip (for example 8.8.4.4. I know, its only an example) transparently.

    There is one more thing i was doing and i'm not able to do right now, but i dont really know if it was "legit", and maybe even if it was working, i'm not sure if it was causing some of the problems i had with past firewal, and it's this:
    I was , with NAT and 1:1 nat, re-routing traffic from my LAN to the 10.0.101.0/24 MPLS wan, to let my LAN machines reach a couple of machines in the other LAN. And i was doing in this way:

    machine to reach: 10.0.101.1
    LAN client calls 10.1.101.1
    Firewall remap outgoing call 10.1.101.1 to 10.0.101.1 forcing to use the WAN gateway.
    It was workin.. LAN machines could reach RDP and SMB on the other machine in another site calling 10.1.101.1.
    I then had several problem with the firewall itself stop responding randomly to clients on both sides of the network, but me and support didnt manage to pinpoint the problem, so i moved from that product to pfSense. I'm not a real pro in networking, and maybe what i was doing was wrong. Anyway, there is a way to accomplish that with pfSense?

    1 Reply Last reply Reply Quote 0
    • V
      viragomann
      last edited by May 26, 2016, 8:10 PM

      @Kedryn:

      What i still didnt manage do to, and was working with previous firewall software, is that when a machine in my LAN tries to access, for example, nas.myfirm.priv, that is 192.168.160.4 in the DNS, it has to be redirected to the LAN ip of the 1:1 mapped WAN addrest. For example, i was mapping outgoing  calls to 192.168.160.4, from LAN to WAN doing an 1:1NAT  to 10.0.0.4 (nas ip in LAN). How i can do the same with pfSense? No, split dns is not an option this time.

      You have to set the NAT reflection option in the NAT rule. However, I don't use it in 1:1 NAT, so I don't know if it works properly here.
      See also the NAT reflection settings in Advanced > Firewall & NAT

      @Kedryn:

      Another thing i'm still trying to do, and its similar, is redirect calls from LAN to an external ip (for example 8.8.8.8) to another external ip (for example 8.8.4.4. I know, its only an example) transparently.

      Just set up a NAT port forwarding rule. But if it should be really transparent, so that the respond comes from 8.8.8.8 you also need an outbound NAT rule for the LAN interface in addition to translate the source address in the respond.

      @Kedryn:

      There is one more thing i was doing and i'm not able to do right now, but i dont really know if it was "legit", and maybe even if it was working, i'm not sure if it was causing some of the problems i had with past firewal, and it's this:
      I was , with NAT and 1:1 nat, re-routing traffic from my LAN to the 10.0.101.0/24 MPLS wan, to let my LAN machines reach a couple of machines in the other LAN. And i was doing in this way:

      machine to reach: 10.0.101.1
      LAN client calls 10.1.101.1
      Firewall remap outgoing call 10.1.101.1 to 10.0.101.1 forcing to use the WAN gateway.
      It was workin.. LAN machines could reach RDP and SMB on the other machine in another site calling 10.1.101.1.
      I then had several problem with the firewall itself stop responding randomly to clients on both sides of the network, but me and support didnt manage to pinpoint the problem, so i moved from that product to pfSense. I'm not a real pro in networking, and maybe what i was doing was wrong. Anyway, there is a way to accomplish that with pfSense?

      So you want to route a part of LAN subnet to a gateway on WAN side.  ::) I can believe that this makes trouble, presumably also with pfSense.
      You can try a static route, but I'm in doubt…

      1 Reply Last reply Reply Quote 0
      1 out of 2
      • First post
        1/2
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
        This community forum collects and processes your personal information.
        consent.not_received