• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

(SOLVED) NAT rule for WAN port from Firewall A w/ openvpn server to device behind Firewall B w/ openvpn client

Scheduled Pinned Locked Moved NAT
3 Posts 1 Posters 307 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    SipriusPT
    last edited by SipriusPT Jul 22, 2020, 4:47 PM Jul 22, 2020, 11:13 AM

    Hello,

    I am trying to setup a NAT rule for a WAN port from Firewall A to a device behind a Firewall B, where both Firewalls are connected with a site-to-site openvpn connection, being Firewall A the server, and Firewall B the client, but not sure why am not being able to do it till know, like I have been doing for local networks of Firewall A.

    The schematic, where in red is what I am trying to achieve through a NAT rule for a certain port:

    0b73ff92-ec74-4f73-8544-37f06f9b3a3e-image.png

    From 10.0.0.0/24 network I am able to access 10.0.10.0/24 and vice-versa without issues (including that 10.0.10.100 device and port). I am able to setup NAT rules on WAN address in Firewall A to 10.0.0.0/24 and even to other local networks there that I have not add in the schematic. In Firewall A I use Hybrid Outbound Nat mode. From

    From System > Advanced, I have setup the following options:

    c0e8b93c-0859-41ec-a5eb-3b37093c80bd-image.png

    Anyone knows what is missing out of my config?

    If you need more info I can provide without problem.

    Thanks in advance!

    1xSG-4860-1U
    1xSG-3100
    2xpfSense Virtual Machines

    1 Reply Last reply Reply Quote 0
    • S
      SipriusPT
      last edited by Jul 22, 2020, 4:16 PM

      Connections are being received in Firewall A, and seems to point to the right machine and port:

      33932fa6-3922-42a8-ae25-d88975c626fe-image.png

      But no output for the device 31.22.x.x.

      1xSG-4860-1U
      1xSG-3100
      2xpfSense Virtual Machines

      1 Reply Last reply Reply Quote 0
      • S
        SipriusPT
        last edited by SipriusPT Jul 22, 2020, 4:47 PM Jul 22, 2020, 4:46 PM

        So, after a some CSI I notice that inbound packages where reaching the target machine, the problem was that the Firewall B didnt knew where to sent back the response, so I added a new rule in NAT Outbound for this particular device, and worked like a charm:

        0d66b8df-182e-417f-b492-f56c1d24b4d4-image.png

        NOTE: Firewall B doesnt use Firewall A gateway, its a "hybrid" VPN.

        1xSG-4860-1U
        1xSG-3100
        2xpfSense Virtual Machines

        1 Reply Last reply Reply Quote 0
        3 out of 3
        • First post
          3/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          This community forum collects and processes your personal information.
          consent.not_received