• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Static route for avoid double NAT

Scheduled Pinned Locked Moved Routing and Multi WAN
30 Posts 2 Posters 1.9k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A
    Antibiotic
    last edited by Antibiotic Nov 11, 2024, 12:07 PM Nov 11, 2024, 11:57 AM

    Hello community!
    Can not to make working my settings.

    1. pfSense router 192.168.20.1
    2. Asus router 192.168.20.2 ( set in pfSense as statis IP and get IP automaticaly in router)
    3. Internal router subnet 192.168.100.0/24
      What was did:
    4. Assign gateway in pfSesne
      Screenshot_11-11-2024_135438_192.168.10.1.jpeg
    5. Made static route
      Screenshot_11-11-2024_135514_192.168.10.1.jpeg
    6. Disabled DCHP, FIREWALL and NAT in Asus router.

    Have a question, do I need to make static route in Asus router, if yes what kind of settings to apply?
    Screenshot_11-11-2024_135720_192.168.20.2.jpeg

    And yes, I can set to AP mode router but want to learn static route to make him work!

    This is firewall rules on pfSense interface:
    Screenshot_11-11-2024_135932_192.168.10.1.jpeg

    Please assist me to make this to work!
    pfSesne advanced settings set "Check Bypass firewall rules for traffic on the same interface"
    pfSense Unbound in forwarder mode to cloudflare.
    pfSesne use OpenVPN as client to mullvad VPN.
    pfSense use KEA DCHP.

    V 1 Reply Last reply Nov 11, 2024, 1:27 PM Reply Quote 0
    • V
      viragomann @Antibiotic
      last edited by Nov 11, 2024, 1:27 PM

      @Antibiotic said in Static route for avoid double NAT:

      Have a question, do I need to make static route in Asus router, if yes what kind of settings to apply?

      It needs a route at least to access devices behind pfSense from its point of view.
      If you have stated pfSense as upstream gateway on the Asus router no further routes are needed.

      This is firewall rules on pfSense interface:

      Since you've disable NAT, I don't expect, that pfSense sees packets from the routers IP, when a device behind the router tries to access something.
      You will need rules for the source of the router for the routers traffic, but you need also rules to allow traffic from 192.168.100.0/24.

      A 1 Reply Last reply Nov 11, 2024, 1:39 PM Reply Quote 0
      • A
        Antibiotic @viragomann
        last edited by Antibiotic Nov 11, 2024, 1:45 PM Nov 11, 2024, 1:39 PM

        @viragomann said in Static route for avoid double NAT:

        You will need rules for the source of the router for the routers traffic, but you need also rules to allow traffic from 192.168.100.0/24.

        Can you please explain more in deep. I need this rules on pfSesne in NAT firewall? NAT port forward or NAT outbound?or firewall rules for this interface?

        A 2 Replies Last reply Nov 11, 2024, 1:47 PM Reply Quote 0
        • A
          Antibiotic @Antibiotic
          last edited by Nov 11, 2024, 1:47 PM

          @Antibiotic said in Static route for avoid double NAT:

          source of the router

          It mean 192.168.20.2?

          1 Reply Last reply Reply Quote 0
          • A
            Antibiotic @Antibiotic
            last edited by Nov 11, 2024, 1:48 PM

            @Antibiotic said in Static route for avoid double NAT:

            for the routers traffic

            It mean 192.168.20.1?

            V 1 Reply Last reply Nov 11, 2024, 1:58 PM Reply Quote 0
            • V
              viragomann @Antibiotic
              last edited by Nov 11, 2024, 1:58 PM

              @Antibiotic
              Your rule set on the ASUS interface doesn't allow any traffic from 192.168.100.0/24 apart from DNS, NTP und IGMP.
              So you need to add rules to allow access for the subnet behind the router.

              A 1 Reply Last reply Nov 11, 2024, 2:01 PM Reply Quote 0
              • A
                Antibiotic @viragomann
                last edited by Antibiotic Nov 11, 2024, 2:05 PM Nov 11, 2024, 2:01 PM

                @viragomann So this is clear , I have to make rule to allow traffic from 192.168.100.0/24 in pfsesne interface. Is it right? But not to clear about NAT rule?

                V 1 Reply Last reply Nov 11, 2024, 2:04 PM Reply Quote 0
                • V
                  viragomann @Antibiotic
                  last edited by Nov 11, 2024, 2:04 PM

                  @Antibiotic
                  You don't no NAT rule. You want it to do with routes, as you mentioned.

                  A 2 Replies Last reply Nov 11, 2024, 2:07 PM Reply Quote 0
                  • A
                    Antibiotic @viragomann
                    last edited by Antibiotic Nov 11, 2024, 2:08 PM Nov 11, 2024, 2:07 PM

                    @viragomann So, I need only one rule to allow traffic 192.168.100.0/24 ?And static route.

                    1 Reply Last reply Reply Quote 0
                    • A
                      Antibiotic @viragomann
                      last edited by Antibiotic Nov 11, 2024, 2:19 PM Nov 11, 2024, 2:18 PM

                      @viragomann Oh god I did a rule and start working))))
                      Thank you my friend)))
                      Screenshot_11-11-2024_161446_192.168.20.1.jpeg

                      But it will correct order or better to set first as rule or doesn't matter? And also "any" ports destination gateway will correct in this rule regarding security?

                      V 1 Reply Last reply Nov 11, 2024, 2:33 PM Reply Quote 0
                      • V
                        viragomann @Antibiotic
                        last edited by Nov 11, 2024, 2:33 PM

                        @Antibiotic
                        The order of the router and the routers LAN doesn't matter.

                        For the security point, just restrict access for 92.168.100.0/24.
                        If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                        A 3 Replies Last reply Nov 11, 2024, 2:39 PM Reply Quote 0
                        • A
                          Antibiotic @viragomann
                          last edited by Nov 11, 2024, 2:39 PM

                          @viragomann OK thank you, but the second problem now traffic going over default gateway not over VPN gateway. But if set to VPN gateway in rule traffic not going at all?

                          V 1 Reply Last reply Nov 11, 2024, 2:53 PM Reply Quote 0
                          • A
                            Antibiotic @viragomann
                            last edited by Antibiotic Nov 11, 2024, 2:44 PM Nov 11, 2024, 2:42 PM

                            @viragomann said in Static route for avoid double NAT:

                            If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                            In this case set protocol to TCP/UDP only?

                            1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @Antibiotic
                              last edited by Nov 11, 2024, 2:53 PM

                              @Antibiotic said in Static route for avoid double NAT:

                              OK thank you, but the second problem now traffic going over default gateway not over VPN gateway. But if set to VPN gateway in rule traffic not going at all?

                              You have already a policy-routing rule with the VPN gateway at the last position. Edit it and change the source to 192.168.100.0/24.

                              Then delete the other rule for this subnet.

                              If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                              In this case set protocol to TCP/UDP only?

                              You have already proper rules for these protocols above. No need to add additional.

                              A 1 Reply Last reply Nov 11, 2024, 3:02 PM Reply Quote 0
                              • A
                                Antibiotic @viragomann
                                last edited by Nov 11, 2024, 2:53 PM

                                This post is deleted!
                                1 Reply Last reply Reply Quote 0
                                • A
                                  Antibiotic @viragomann
                                  last edited by Antibiotic Nov 11, 2024, 3:08 PM Nov 11, 2024, 3:02 PM

                                  @viragomann said in Static route for avoid double NAT:

                                  You have already a policy-routing rule with the VPN gateway at the last position. Edit it and change the source to 192.168.100.0/24.

                                  Screenshot_11-11-2024_17157_192.168.20.1.jpeg

                                  Not to clear, what should me delete?
                                  If me delete 3rd rule from down internet not working

                                  V 1 Reply Last reply Nov 11, 2024, 3:20 PM Reply Quote 0
                                  • V
                                    viragomann @Antibiotic
                                    last edited by Nov 11, 2024, 3:20 PM

                                    @Antibiotic
                                    09e2ff6e-66f4-4220-af2f-29c87723f6f0-grafik.png

                                    The red one.

                                    In the yellow you might want to change the source address accordingly.

                                    Also remember, that you have to change the source in the outbound NAT rule on the VPN interface to the new network.

                                    A 3 Replies Last reply Nov 11, 2024, 3:33 PM Reply Quote 0
                                    • A
                                      Antibiotic @viragomann
                                      last edited by Antibiotic Nov 11, 2024, 3:42 PM Nov 11, 2024, 3:33 PM

                                      @viragomann I would like to tell you a big thanks, now everything start working over VPN! What I have now Asus router in router mode, because want to use QOS , statistic and etc and eliminated double NAT. Thank you my friend))) Tried to make to work this static route a few times without success, now I'm happy)))

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        Antibiotic @viragomann
                                        last edited by Nov 11, 2024, 3:34 PM

                                        @viragomann said in Static route for avoid double NAT:

                                        Also remember, that you have to change the source in the outbound NAT rule on the VPN interface to the new network.

                                        That was a point))))

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          Antibiotic @viragomann
                                          last edited by Nov 11, 2024, 3:47 PM

                                          @viragomann But in this settings pfSesne firewall will logging this network 192.168.100.0/24 and pfblockerNG will see this network?

                                          V 1 Reply Last reply Nov 11, 2024, 3:52 PM Reply Quote 0
                                          1 out of 30
                                          • First post
                                            1/30
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received