Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Domain Controller behind pfsense NAT

    Scheduled Pinned Locked Moved NAT
    14 Posts 4 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      William Bento Rodrigues
      last edited by

      Hi guys, good morning.
      I have pfsense configured working as a NAT 1:1 device only. I have 2 domain controller servers in LAN interface with their WAN ip set as well (NAT). Now I have a computer in the WAN interface where I'm trying to enroll it in the domain controller using the domain controler WAN IP address but it's not working. I don't know if there is any special configuration in DNS resolver or DNS forward in pfsense that needs to be configured to make it work well.

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @William Bento Rodrigues
        last edited by

        @William-Bento-Rodrigues
        A more pressing question is why do you want your ADs reachable over the internet and not use a VPN?

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        W 1 Reply Last reply Reply Quote 0
        • W
          William Bento Rodrigues @michmoor
          last edited by

          @michmoor Despite the interface being called the WAN all of pfsense interfaces (LAN and WAN) are in a private network. None of them can be accessed through the internet.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @William Bento Rodrigues
            last edited by

            @William-Bento-Rodrigues Well why make it pfsense "wan" then... Just make it another lan.. Then you don't have to worry about port forwarding and nat.. And you can just create firewall rules to allow what you wan..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            W 1 Reply Last reply Reply Quote 1
            • W
              William Bento Rodrigues @johnpoz
              last edited by William Bento Rodrigues

              @johnpoz as it's configured only for NAT1:1 the firewall rules are allowing all traffic. I'm not filtering anything. Just to make more clear the LAN interface is OT (automation) and WAN interface is IT (it's IT vlan). Despite it being two internal networks, we need to translate an OT device into an IT IP to allow remote desktop, patch and so on within the IT network.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @William Bento Rodrigues
                last edited by

                @William-Bento-Rodrigues And does this "wan" get you to other networks? If not then its not a WAN..

                Been many years since worked in the server area and AD, etc.. But your still doing nat.. And is this network your coming from setup in your AD even.. Just seems like a horrible setup for what reason other than complication and problems..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                W 1 Reply Last reply Reply Quote 1
                • W
                  William Bento Rodrigues @johnpoz
                  last edited by

                  @johnpoz thank your for feedback but it's the client design. do you any idea how to make it work?

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @William Bento Rodrigues
                    last edited by johnpoz

                    @William-Bento-Rodrigues So the client told you to make this the wan and pfsense and nat to our stuff behind it? or the client set this all up and called you to try and make it work?

                    As to how to make it work, yeah don't nat and set it up how any normal network would be setup ;)

                    Worked for a MSP for many years, 13 something - saw a lot of crazy customer setups... Never saw where some customer put their AD DCs behind a nat router to the rest of their network ;) Because well that is just insane..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    M W 2 Replies Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @johnpoz
                      last edited by

                      @johnpoz said in Domain Controller behind pfsense NAT:

                      put their AD DCs behind a nat router to the rest of their network ;) Because well that is just insane..

                      ehhhh...I've seen it. Im living it now. We got IP overlap so we needed to DNAT or SNAT

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      W 1 Reply Last reply Reply Quote 0
                      • W
                        William Bento Rodrigues @johnpoz
                        last edited by

                        @johnpoz pfsense is a legacy of the site.

                        1 Reply Last reply Reply Quote 0
                        • W
                          William Bento Rodrigues @michmoor
                          last edited by

                          @michmoor have you figured out a way to do it?

                          M 1 Reply Last reply Reply Quote 0
                          • M
                            michmoor LAYER 8 Rebel Alliance @William Bento Rodrigues
                            last edited by

                            @William-Bento-Rodrigues
                            Depending on the traffic direction you will need to set up either a SNAT or DNAT.
                            In your example from "WAN" to LAN you need to set up a DNAT with the appropriate firewall rules.

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            W 1 Reply Last reply Reply Quote 0
                            • W
                              William Bento Rodrigues @michmoor
                              last edited by

                              @michmoor thank you! would you have like screenshot on how to do it in pfsense?

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                SteveITS Galactic Empire @William Bento Rodrigues
                                last edited by

                                @William-Bento-Rodrigues Forwarding port 53 would provide DNS, but the workstation would need to know to use that WAN IP…probably a domain override on the upstream router. But then AD DNS would respond with the DNS Server IP. Lots of monkeying around with that I’d think.

                                If you get it to work you’ll presumably need other ports too for instance SMB to pick up netlogon/group policy. Not sure exactly which are needed for the “join” part.

                                Setting up static routes to the server subnet without NAT seems easier…?

                                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                Upvote 👍 helpful posts!

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.