Port restriction rule!
-
If it blocks connections from outside it's own subnet and there's no way to add rules to allow it then you would have to add NAT rules in pfSense. But things start to get ugly when you do that! So I would want to confirm that's really happening.
-
@stephenw If i set back to Wireless router mode than make to allow from outside it's own subnet. Set back to AP mode, will this work?
-
First confirm what is not working.
Can you ping that AP/server from the other subnet? Can you SSH to it? Access it's webgui?
-
@stephenw10 Yes i can ping and access web gui and SSH from other subnet. May be its possible to add some rule from SSH but what the rule? Router firmware based on linux.
-
@Antibiotic So your using some wifi router as just an AP.. Yeah if your just using the makers firmware many of them do not allow setting a gateway on the lan interface.
Can you put 3rd party firmware on it - ddwrt, openwrt, etc. All of these allow for setting a gateway on the lan interface.
If not - sure you could either nat and and allow remote access to its web gui. Or as mentioned you can do a source nat, ie outbound nat so traffic to the AP IP looks like it came from pfsense IP on the same network.
If me I would look to 3rd party firmware. Or better yet get an actual AP vs using some wifi router you had laying about.
Advantages to 3rd party or actual AP is you would also then get vlan support, not just gateway on lan interface.
If stuck with this wifi router as your AP, I would use the outbound/source nat vs double nat and remote access to the devices webgui from remote.
-
@johnpoz Alreaddy use asus merlin. its a 3rd party firmware
-
@johnpoz said in Port restriction rule!:
Can you put 3rd party firmware on it - ddwrt, openwrt, etc. All of these allow for setting a gateway on the lan interface.
You mean to put 192.168.10.1 in LAN gateway settings?But in this case would 192.168.20.0 subnet to see hard disk? And me use VPN on this gateway 192.168.20.1 for wireless network
-
@Antibiotic huh??
No you wouldn't put some other network as your gateway.. That setting looks correct.. If you can access its web gui and ssh via that 20.11 IP from your other network.. Then you fine - your problem with share access is most likely has mentioned by Steve - discovery doesn't work across subnets.. Just access the share via the IP 20.11 or use the fqdn you have setup that resolves to that 20.11 IP.
-
-
@johnpoz Do you mean connect by manually: \RTAX86UPro.home.arpa\HOME
-
Yes. Though entering the IP there should also work.
Check the firewall states when you try that. Is the client even trying to connect?
-
@Antibiotic fully qualified domain name.. ie what you posted from your AP its fqdn would be rtax86upro.home.arpa.. Be it that resolves on your network? You most likely would of had to have setup the record as a host override in unbound on pfsense or if your using some other dns for your network, etc.
edit
Try IP.. unless you had set it up in your dns, its possible that fqdn does not resolve.. If you ping it does it resolve to that 20.11 address? -
@stephenw10 Yea trying to connect \192.168.20.11\HOME but all time going error "the network patch was not found"
-
@Antibiotic well its not just one \ it would be two \
Don't use the specific share.. Just see if you can access to list all shares.
-
@johnpoz i TRIED FROM PC SUBNET 192.168.10.1
net view \rtax86upro.home.arpa and get "System error 53 has occured, the network patch was not found"
-
@johnpoz said in Port restriction rule!:
well its not just one \ it would be two \
i have put two all time but appear on forum only one)))
-
Unless you know that FQDN resolves I'd test with the IP directly:
\\192.168.20.11
-
@stephenw10 Already tried FQDN and by IP all time error. I don't know what the wrong. Can ping. can access web gui and SSH, horrible Windows)))
-
@Antibiotic sure not a firewall issue on the AP thingy? Maybe it doesn't like sharing to non local IPs?
Or what are your firewall rules on the interface on pfsense where your client is trying to access this 20.11 IP.. maybe your not allowing the smb port, which I would assume would be 445. unless its some really old smb sharing maybe using port 139.
-
@Antibiotic said in Port restriction rule!:
"System error 53 has occured, the network patch was not found"
Still that exact same error?
It would be surprising to me if the AP allows gui access and ssh but not smb. Especially because in a 3rd party firmware like that those issues are usually discovered and fixed.
Feels to me more like the client isn't even trying to connect. Hence why I suggested checking the pfSense states when you test. You should see the port 445 states opened on both interfaces.