• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Port forward source filtering

Scheduled Pinned Locked Moved NAT
3 Posts 2 Posters 125 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A
    aljames
    last edited by Mar 26, 2025, 4:54 PM

    I have an internal Wireguard server running that forwards known hosts to an internal Nextcloud server. On pfSense I have a custom UDP port forwarded that sends matching traffic to the Wireguard server. In the pfSense settings I have source IP filtering set. This all works well with remote laptops, however mobile phones won’t connect unless source filtering is set to “All”. I suppose this is because cellular services are always changing IP addresses. Although, I can tether my laptop to my iPhone and use the cellular service to connect home without this issue (this part is weird).

    Anyhow, I am wondering if this source filtering is a waste of time or if it might be worth trying to use some type of DDNS to give my mobile devices a consistent domain.

    Many thanks!

    B 1 Reply Last reply Mar 26, 2025, 6:34 PM Reply Quote 0
    • B
      Bob.Dig LAYER 8 @aljames
      last edited by Mar 26, 2025, 6:34 PM

      @aljames said in Port forward source filtering:

      I suppose this is because cellular services are always changing IP addresses.

      Log the attempts and check if your filtering is working...

      1 Reply Last reply Reply Quote 0
      • A
        aljames
        last edited by Mar 28, 2025, 1:20 AM

        Thanks for the suggestion. I think my problem is the source IP that I had entered was the virtual interface (wg1) address of the remote host. I think this is supposed to be the physical IP of the remote host because the tunnel isn’t alive until access to the internal Wireguard server is physically possible. Mobile devices on cellular have dynamic IPs as far as I know, so not really possible to allow a device only that has a ever-changing IP. I wish there was a way to only allow a mobile device on cellular without setting allow “All” sources on the port forward.
        I feel like I’m rambling. My apologies :)

        1 Reply Last reply Reply Quote 0
        3 out of 3
        • First post
          3/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          This community forum collects and processes your personal information.
          consent.not_received