Website Port Forward
-
I have IIS running on a Windows XP Pro machine which contains an ASP.NET website. I can browse the site from inside my LAN by using http://TheServerIP/TEST however I am unable to see it by using my actual IP such as http://MyIP/TEST
I have set a rule to have port 80 direct itself to that particular machine, but still it doesn't work. My idea is to be able to eventually have my dyndns setup allow me to host the site without the use of the IP, but I'm not sure why the firewall seems to be not allowing traffic right now.
Any ideas?
-
http://forum.pfsense.org/index.php/topic,7001.0.html
nat reflection -
http://forum.pfsense.org/index.php/topic,7001.0.html
nat reflectionThanks for the response, but that seems to be telling me to set up the Port Forward, I have done that.
-
System:
Advanced:
If you want to be able to use NAT-mappings from withing your own LAN disable the checkbox "Disable NAT Reflection"How do your firewall rules look like?
Could you show a screenshot? -
System:
Advanced:
If you want to be able to use NAT-mappings from withing your own LAN disable the checkbox "Disable NAT Reflection"How do your firewall rules look like?
Could you show a screenshot?I found out this morning that apparently it can be hit from outsite, however I have to use the internal address if I'm using a PC on my LAN. But as long as people can access it from outsite my home I am ok with that.
But it would be nice to have it fixed correctly. Is this a bug with PFSense?
-
I can assure you that something this fundamental is unlikely to be a bug in pfSense.
Have you ticked the "disable NAT reflection"? If so, that's likely to be the cause of your problem.
-
I can assure you that something this fundamental is unlikely to be a bug in pfSense.
Have you ticked the "disable NAT reflection"? If so, that's likely to be the cause of your problem.
Disable NAT reflection is checked, should that be unchecked? And if so, why does it default to being checked?
-
Yes, it should be unchecked.
I don't know why it's checked by default.