Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense Port Forwarding issue behind Uverse Modem

    Scheduled Pinned Locked Moved NAT
    12 Posts 5 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cewjr9842
      last edited by

      Good Day all!
      I made sure to check the information below first before posting:
      https://forum.netgate.com/topic/6225/port-forward-troubleshooting

      I know its probably something simple, at least I hope it is. I am new to the whole PFsense thing in regards to running the system behind a POS Att Uverse fiber gateway, but any way i am stumped in the sense for port forwarding some ports. I wanted to start off by just adding a simple RDP(3389) before adding any other ports for forwarding to allow external access to a desktop from my work location, but I can not for the life of me get this port forwarding to work. It was not a problem when I had my spectrum router and was able to put it into bridge mode the simple way, but ATT F**ks that up for you.

      My Setup is as follows:
      Arris NVG599 router(SUbnet changed to 192.168.2.254)----> PFSENSE Router
      (PFsense Gateway 192.168.2.88
      PFsense LAN 192.168.1.0/24)---> Desktop(192.168.1.55)
      I have placed the PFsense router in IP Passthrough in the NVG firewall to allow all traffic to my pfsense box.

      The gateway info is below:

      0_1535385118923_b523429b-aa55-4502-9c3d-2d39bf0f282d-image.png
      0_1535386356950_5404971a-2a9a-483e-b95a-39672db2bbd9-image.png
      IPV4 Gateway-
      0_1535385152260_ae490083-e2e4-45d8-ae58-f4d60f19cdeb-image.png

      NAT:
      On Advanced---> Routing---->Firewall and NAT:
      0_1535385509126_ae03afe5-d0a7-4406-a345-d964b4c21416-image.png

      Firewall>NAT>Port Forward Rule:
      0_1535385611908_f301a70e-d5df-4320-be05-79df321b4d28-image.png

      NAT Outbound:
      0_1535385767738_a3d49589-1900-4f84-8efe-e74a56cc77db-image.png

      Firewall>Rule:
      0_1535385699432_ef733650-6a80-412b-b273-af385254dd20-image.png
      0_1535386665920_10b172f1-3c1e-4abd-b56e-6139daca1f84-image.png

      Rules:
      WAN:
      0_1535386588929_064147a3-c29c-4e8f-aa29-8411c0a0dfd9-image.png

      LAN:
      0_1535386620393_c89dbc22-1028-45d6-8e05-79a9c126191b-image.png

      I am wondering if something is either incorrect with the gateway or with the NATTing. I am able to get out to the world and ping out but I can not get the external to internal port checks to work either.

      Like I said this was not an issue when I had my first router in bridge mode, just when we switched to Uverse fiber after relocating. Any assistance would surely be appreciated and thanks in advance. Let me know if I need to provide anything else.

      GrimsonG 1 Reply Last reply Reply Quote 0
      • GrimsonG
        Grimson Banned @cewjr9842
        last edited by

        @cewjr9842 said in Pfsense Port Forwarding issue behind Uverse Modem:

        Good Day all!
        I made sure to check the information below first before posting:
        https://forum.netgate.com/topic/6225/port-forward-troubleshooting

        So what did the packet captures show, does the traffic arrive at the pfSense WAN interface, does it leave the LAN interface? If you followed the docs you should be able to answer this.

        C 1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          To be honest first step in troubleshooting is validating that traffic actually gets to pfsense WAN.. Simple packet capture while you try and access that port from remote. canyouseeme org is good site for testing this.

          If you validate traffic is getting to you - and still not working.. Sniff on lan - does pfsense send it on to the IP you want to send it too, ie this 192.168.1.55 address..

          If so and you get no response then problem on client - firewall on client. Windows out of the box sure and the hell not going to allow for rdp from some public IP address. Is the the service actually running and listening..

          All of these troubleshooting steps are gone over in the doc you listed..

          Your not trying to test this port forward from a device on your 192.168.1 network are you? That would be a nat reflection and whole different ball of wax to why it might not be working.

          A quick glance at your forward and your rules look ok - so my take would be upstream either your isp, your router or where your testing from is blocking 3389? Its not a very good idea to open 3389 to the public internet btw..

          There was a recent thread where person was troubleshooting port forwarding - and from simple sniff (packet capture) in diag menu of pfsense it was clear the device he was trying to forward to was sending back RST which is why it was not working.. pfsense port forwarding was fine.

          Also btw rdp can use both tcp and udp..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          C 1 Reply Last reply Reply Quote 0
          • C
            cewjr9842 @Grimson
            last edited by

            @grimson

            Sorry I Left all that out, on what I did last night while troubleshooting.
            I did use canyouseeme and ran a packet capture and for some reason I did not get any information on the packet capture to my wan. :

            Error: I could not see your service on WAN on port (3389)

            I also ran it using Network Port Checker & Scanner Tool
            and got the results below:

            0_1535388328937_30c29f59-4e0c-423e-bc0b-59a0375c436d-image.png

            1 Reply Last reply Reply Quote 0
            • C
              cewjr9842 @johnpoz
              last edited by

              @johnpoz Like I was telling grim, i did try to do a external capture using
              canyousee me and also a network tool checker and got the results below:

              0_1535388763611_68c114ee-0731-4adc-bca8-723b79585338-image.png

              When I try the packet capture on the LAN i get information going out to the interweb.
              0_1535388862751_bb8056f2-2602-4cdf-8f73-6d21a34cbf8f-image.png

              When I was testing outbound I was testing from my work PC at another location to my routers firewall, as well as my android phone not connected to my network. it still is a fail.
              Also on the rule aspect I did try touse 3389 for RDP rule using TCP and UDP but still neither would work. Im stumped at this point because it should not be this difficult as i never had issues before.

              1 Reply Last reply Reply Quote 0
              • GrimsonG
                Grimson Banned
                last edited by

                Well if your packet capture shows no matching incoming traffic on the WAN then the problem is upstream of pfSense. Either your "modem" (which is actually a nat gateway) is not forwarding the packets or your provider is blocking the port.

                C 1 Reply Last reply Reply Quote 1
                • C
                  cewjr9842 @Grimson
                  last edited by

                  @grimson understood. I just checked again, and yep, i am not getting any thing when trying to point to my WAN. Im trying to Wireshark now to see if I can at least see if it matches what I an seeing in pfsense packet capture right now.

                  1 Reply Last reply Reply Quote 0
                  • C
                    cewjr9842
                    last edited by cewjr9842

                    @Grimson @johnpoz Now i'm going to tell you something that is dumb as hell. So since i put my router in IP pass through for my pfsense something told me to try and add RDP port 3389 to the uverse modem and try allow it to my pfsense IP address and it works now, which is stupid to me honestly. I thought IP pass-through was to allow all traffic to a particular address and to not block it at all. this makes literally no sense at all. SO i have to add ports to the uverse modem and ports to the pfsense box to allow any external access. Once again I hate at&t with a passion!! Is this something I can bypass or am I stuck with this dumb ass solution?

                    chpalmerC 1 Reply Last reply Reply Quote 0
                    • chpalmerC
                      chpalmer @cewjr9842
                      last edited by

                      @cewjr9842 said in Pfsense Port Forwarding issue behind Uverse Modem:
                      Once again I hate at&t with a passion!! Is this something I can bypass or am I stuck with this dumb ass solution?

                      Some light reading for you.
                      http://www.dslreports.com/forum/r29903721-AT-T-Residential-Gateway-Bypass-True-bridge-mode

                      Triggering snowflakes one by one..
                      Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                      C 1 Reply Last reply Reply Quote 2
                      • C
                        cewjr9842 @chpalmer
                        last edited by

                        @chpalmer I wish it was that possible, since I have Internet and TV with them.
                        I would definitely do it if i only had internet.

                        1 Reply Last reply Reply Quote 0
                        • N
                          Napsterbater
                          last edited by

                          Just as a suggestion.. And while this is ofcourse "Security through obscurity", at least use a different random port on the WAN side, and then forward that to local 3389. Then when connecting just specify the port number "rdpserver.FQDN.net:12345" or "127.213.12.123:12345", etc.

                          Of course the best option is set up a VPN and lock off RDP from WAN. But at the very least it keeps the bots away for the most part.

                          Or add an additional port for RDP to use locally via REGEDIT (it can have more than one). either way you can use the default/3389 on LAN and the new port for remote.

                          And to add, I also despise AT&Ts forced gateways. One reason they are always on the bottom of my list of ISPs.

                          C 1 Reply Last reply Reply Quote 1
                          • C
                            cewjr9842 @Napsterbater
                            last edited by

                            @napsterbater Thanks napsterbater. I was just trying to RDP/3389 as my first step to testing port forwarding on the pfsense router before adding any other ports but I didn't know that at&t was so sh***y to the point where they would block a passthrough/supposed DMZ'ed IP address to allow all items to that one address, but I should have known better. I wish another ISP was available in my location, i would leave them with the quickness. But to have to add port forwarding in my pfsense and then port forwarding in the Uverse gateway, is ludicrous and makes no sense for a DMZ'ed address. Thanks again fro the suggestion and I appreciate you alls time and help on this!

                            1 Reply Last reply Reply Quote 1
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.