Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Static route for avoid double NAT

    Scheduled Pinned Locked Moved Routing and Multi WAN
    30 Posts 2 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @Antibiotic
      last edited by

      @Antibiotic said in Static route for avoid double NAT:

      Have a question, do I need to make static route in Asus router, if yes what kind of settings to apply?

      It needs a route at least to access devices behind pfSense from its point of view.
      If you have stated pfSense as upstream gateway on the Asus router no further routes are needed.

      This is firewall rules on pfSense interface:

      Since you've disable NAT, I don't expect, that pfSense sees packets from the routers IP, when a device behind the router tries to access something.
      You will need rules for the source of the router for the routers traffic, but you need also rules to allow traffic from 192.168.100.0/24.

      A 1 Reply Last reply Reply Quote 0
      • A
        Antibiotic @viragomann
        last edited by Antibiotic

        @viragomann said in Static route for avoid double NAT:

        You will need rules for the source of the router for the routers traffic, but you need also rules to allow traffic from 192.168.100.0/24.

        Can you please explain more in deep. I need this rules on pfSesne in NAT firewall? NAT port forward or NAT outbound?or firewall rules for this interface?

        A 2 Replies Last reply Reply Quote 0
        • A
          Antibiotic @Antibiotic
          last edited by

          @Antibiotic said in Static route for avoid double NAT:

          source of the router

          It mean 192.168.20.2?

          1 Reply Last reply Reply Quote 0
          • A
            Antibiotic @Antibiotic
            last edited by

            @Antibiotic said in Static route for avoid double NAT:

            for the routers traffic

            It mean 192.168.20.1?

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @Antibiotic
              last edited by

              @Antibiotic
              Your rule set on the ASUS interface doesn't allow any traffic from 192.168.100.0/24 apart from DNS, NTP und IGMP.
              So you need to add rules to allow access for the subnet behind the router.

              A 1 Reply Last reply Reply Quote 0
              • A
                Antibiotic @viragomann
                last edited by Antibiotic

                @viragomann So this is clear , I have to make rule to allow traffic from 192.168.100.0/24 in pfsesne interface. Is it right? But not to clear about NAT rule?

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @Antibiotic
                  last edited by

                  @Antibiotic
                  You don't no NAT rule. You want it to do with routes, as you mentioned.

                  A 2 Replies Last reply Reply Quote 0
                  • A
                    Antibiotic @viragomann
                    last edited by Antibiotic

                    @viragomann So, I need only one rule to allow traffic 192.168.100.0/24 ?And static route.

                    1 Reply Last reply Reply Quote 0
                    • A
                      Antibiotic @viragomann
                      last edited by Antibiotic

                      @viragomann Oh god I did a rule and start working))))
                      Thank you my friend)))
                      Screenshot_11-11-2024_161446_192.168.20.1.jpeg

                      But it will correct order or better to set first as rule or doesn't matter? And also "any" ports destination gateway will correct in this rule regarding security?

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @Antibiotic
                        last edited by

                        @Antibiotic
                        The order of the router and the routers LAN doesn't matter.

                        For the security point, just restrict access for 92.168.100.0/24.
                        If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                        A 3 Replies Last reply Reply Quote 0
                        • A
                          Antibiotic @viragomann
                          last edited by

                          @viragomann OK thank you, but the second problem now traffic going over default gateway not over VPN gateway. But if set to VPN gateway in rule traffic not going at all?

                          V 1 Reply Last reply Reply Quote 0
                          • A
                            Antibiotic @viragomann
                            last edited by Antibiotic

                            @viragomann said in Static route for avoid double NAT:

                            If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                            In this case set protocol to TCP/UDP only?

                            1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @Antibiotic
                              last edited by

                              @Antibiotic said in Static route for avoid double NAT:

                              OK thank you, but the second problem now traffic going over default gateway not over VPN gateway. But if set to VPN gateway in rule traffic not going at all?

                              You have already a policy-routing rule with the VPN gateway at the last position. Edit it and change the source to 192.168.100.0/24.

                              Then delete the other rule for this subnet.

                              If you want to give it only access to DNS, NTP, IGMP and internet limit the rule accordingly.

                              In this case set protocol to TCP/UDP only?

                              You have already proper rules for these protocols above. No need to add additional.

                              A 1 Reply Last reply Reply Quote 0
                              • A
                                Antibiotic @viragomann
                                last edited by

                                This post is deleted!
                                1 Reply Last reply Reply Quote 0
                                • A
                                  Antibiotic @viragomann
                                  last edited by Antibiotic

                                  @viragomann said in Static route for avoid double NAT:

                                  You have already a policy-routing rule with the VPN gateway at the last position. Edit it and change the source to 192.168.100.0/24.

                                  Screenshot_11-11-2024_17157_192.168.20.1.jpeg

                                  Not to clear, what should me delete?
                                  If me delete 3rd rule from down internet not working

                                  V 1 Reply Last reply Reply Quote 0
                                  • V
                                    viragomann @Antibiotic
                                    last edited by

                                    @Antibiotic
                                    09e2ff6e-66f4-4220-af2f-29c87723f6f0-grafik.png

                                    The red one.

                                    In the yellow you might want to change the source address accordingly.

                                    Also remember, that you have to change the source in the outbound NAT rule on the VPN interface to the new network.

                                    A 3 Replies Last reply Reply Quote 0
                                    • A
                                      Antibiotic @viragomann
                                      last edited by Antibiotic

                                      @viragomann I would like to tell you a big thanks, now everything start working over VPN! What I have now Asus router in router mode, because want to use QOS , statistic and etc and eliminated double NAT. Thank you my friend))) Tried to make to work this static route a few times without success, now I'm happy)))

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        Antibiotic @viragomann
                                        last edited by

                                        @viragomann said in Static route for avoid double NAT:

                                        Also remember, that you have to change the source in the outbound NAT rule on the VPN interface to the new network.

                                        That was a point))))

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          Antibiotic @viragomann
                                          last edited by

                                          @viragomann But in this settings pfSesne firewall will logging this network 192.168.100.0/24 and pfblockerNG will see this network?

                                          V 1 Reply Last reply Reply Quote 0
                                          • V
                                            viragomann @Antibiotic
                                            last edited by

                                            @Antibiotic
                                            Yes, for pfSense. pfBlocker will not care about networks by default. Just ensure that the ASUS interface is selected in "Outbound Firewall Rules".

                                            A 2 Replies Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.