• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Redirect SMTP and HTTP traffic with virtual IP from a specific source alone

Scheduled Pinned Locked Moved NAT
23 Posts 4 Posters 8.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    djvenky
    last edited by Apr 6, 2010, 5:19 PM

    Dear Pf sense Team,

    I have been facing a lot pressure from my fellow superior heads. In our company we often get VIP guests visting us and they bring their laptop and want the SMTP port 25 to be opened for them. And every time they come and go i get my static IP blacklisted, its been very annoying.
    I was thinking of using SMTP proxy in the firewall first level and second level of redirecting SMTP traffic from a particular source to any using a different static IP other than the default one.

    Can anyone suggest if this redirecting can be done in pfsense ?

    Thanks,
    Venkat

    1 Reply Last reply Reply Quote 0
    • E
      Eugene
      last edited by Apr 6, 2010, 9:00 PM

      If you have multiple public IP addresses available on your WAN interface then just go to Firewalls-NAT-Outgoing and add NAT rule for specific local IP address (you give to guests) mapping it to one designated public IP. smtp proxy will not help here as it will be blacklisted as well (if I understand your question correctly).

      http://ru.doc.pfsense.org

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by Apr 6, 2010, 10:43 PM

        You don't want to redirect it, you want to change your NAT, either so your mail server goes out a diff IP or the inside hosts do.

        1 Reply Last reply Reply Quote 0
        • D
          djvenky
          last edited by Apr 7, 2010, 4:44 PM

          Hello Eugene,

          I tried your steps, but it doesn't show the designated public IP when i verify it using myipaddress.com site.
          Or maybe i did it wrongly, below is the rule i have added, please correct me if i am wrong.

          Added outgoing NAT rule like –>
          ISP Name  172.17.0.0/16 * * * 58.x.x.x *

          Venkat

          1 Reply Last reply Reply Quote 0
          • D
            djvenky
            last edited by Apr 7, 2010, 4:46 PM

            @cmb:

            You don't want to redirect it, you want to change your NAT, either so your mail server goes out a diff IP or the inside hosts do.

            Yes exactly, but how do i go about it.

            1 Reply Last reply Reply Quote 0
            • E
              Eugene
              last edited by Apr 7, 2010, 4:55 PM

              can we see your pfctl -sn ?
              this rule has to go before other rules with 172.17.0.0/16 as a source net.

              http://ru.doc.pfsense.org

              1 Reply Last reply Reply Quote 0
              • D
                djvenky
                last edited by Apr 7, 2010, 5:28 PM

                @Eugene:

                can we see your pfctl -sn ?
                this rule has to go before other rules with 172.17.0.0/16 as a source net.

                Yes PFA

                pfsense.jpg_thumb
                pfsense.jpg

                1 Reply Last reply Reply Quote 0
                • E
                  Eugene
                  last edited by Apr 7, 2010, 5:41 PM

                  So 172.17.0.0/16 has to use 58.xxx public IP. Does it?

                  http://ru.doc.pfsense.org

                  1 Reply Last reply Reply Quote 0
                  • K
                    kpa
                    last edited by Apr 7, 2010, 5:43 PM

                    Is that IP starting with 58 a virtual IP on your WAN interface? Then you need to change the interface in your outbound NAT rule to WAN. Outbound NAT rules are matched with outgoing traffic on an interface, not incoming.

                    1 Reply Last reply Reply Quote 0
                    • D
                      djvenky
                      last edited by Apr 7, 2010, 5:45 PM

                      @Eugene:

                      So 172.17.0.0/16 has to use 58.xxx public IP. Does it?

                      Yes Eugene, thats what i exactly want to do.

                      1 Reply Last reply Reply Quote 0
                      • E
                        Eugene
                        last edited by Apr 7, 2010, 5:46 PM

                        kpa is right.

                        http://ru.doc.pfsense.org

                        1 Reply Last reply Reply Quote 0
                        • D
                          djvenky
                          last edited by Apr 7, 2010, 5:52 PM Apr 7, 2010, 5:50 PM

                          Actually we have two ISP. one is WAN [reliance] and the other one is Aircel. In this i am trying route a specific source to any using additional static IP from Aircel ISP which starts with 58.x.x.x series.

                          1 Reply Last reply Reply Quote 0
                          • E
                            Eugene
                            last edited by Apr 7, 2010, 5:53 PM

                            In this case you have to choose proper Gateway in Firewall->Rules for this specific traffic.

                            http://ru.doc.pfsense.org

                            1 Reply Last reply Reply Quote 0
                            • D
                              djvenky
                              last edited by Apr 7, 2010, 6:29 PM Apr 7, 2010, 6:13 PM

                              Okay i think i am making some other mistake. Internet doesn't even work when i just set the outbound NAT rule. It just starts staying looking up google.com when i hit it on the browser. If i just allow full access to the domain and DNS server in Rules–> LAN   isn't that enough ? or do i have to add any specific rules.

                              But it didn't state connecting to google.com when i hit it in the browser, so i am assuming its only DNS resolution needs to be corrected.
                              Any clue's where i would have gone wrong.

                              1 Reply Last reply Reply Quote 0
                              • D
                                djvenky
                                last edited by Apr 7, 2010, 6:29 PM

                                @Eugene:

                                In this case you have to choose proper Gateway in Firewall->Rules for this specific traffic.

                                Yes i  checked it, its all set correctly to corresponding GW

                                1 Reply Last reply Reply Quote 0
                                • E
                                  Eugene
                                  last edited by Apr 7, 2010, 6:36 PM

                                  How many interfaces do you have?

                                  http://ru.doc.pfsense.org

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    djvenky
                                    last edited by Apr 8, 2010, 5:42 AM

                                    3 interfaces:
                                    1. LAN
                                    2. WAN - Reliance ISP
                                    3. Aircel - ISP

                                    1 Reply Last reply Reply Quote 0
                                    • E
                                      Eugene
                                      last edited by Apr 8, 2010, 1:47 PM

                                      How come you have two networks 172.17.0.0/16 and 172.16.0.0/16 on LAN, what are setting (IP address/mask) on your LAN interface?

                                      http://ru.doc.pfsense.org

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        djvenky
                                        last edited by Apr 8, 2010, 2:25 PM Apr 8, 2010, 2:23 PM

                                        Actualy our Local LAN network is seperated into different VLAN using cisco catalyst switches.

                                        IP : 172.16.0.0 /16 and 172.17.0.0/16 and 10.5.0.0/16
                                        172.17.x.x for Wireless and 172.16.x.x for servers and 10.5.x.x for desktops like that.

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          Eugene
                                          last edited by Apr 8, 2010, 2:26 PM

                                          Little diagram/explanation would definitely have here
                                          172.16.0.0/16 vlan x–--|catalyst|?.?.?.?/? vlan ?-----?.?.?.?/?pfSense
                                          172.17.0.0/16 vlan y----|          |

                                          http://ru.doc.pfsense.org

                                          1 Reply Last reply Reply Quote 0
                                          1 out of 23
                                          • First post
                                            1/23
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received