Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    WAN port forward ton LAN ips (multi wan).

    Scheduled Pinned Locked Moved Routing and Multi WAN
    17 Posts 3 Posters 9.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hoba
      last edited by

      Just add portforwards at both interfaces with firewall>NAT, portforward. Make sure your Modemrouters in front of the WAN are forwarding incoming requests from wan to the pfSenses wan interfaces. Entering a DMZ IP at the Modemrouters is the easiest way to redirect ALL traffic to the WANs of the pfSense (if these modemrouters have that option).

      1 Reply Last reply Reply Quote 0
      • A
        analyzerx
        last edited by

        I think I've done that…
        modem 1 with ip 192.168.2.1 forwards all ports to 192.168.2.3

        should it forward there or to something like 192.168.1.1???
        I've forwarded for example port 3000 like this:

        but nothing happens… o_O

        1 Reply Last reply Reply Quote 0
        • H
          hoba
          last edited by

          make sure you have a firewall rule in place too to allow this traffic. Also check order of your firewallrules (first match wins). If you block something earlier you can't make it pass with a rule that is further down the list. Best thing is to let the firewallrules be autocreated. Also check that you have "block private subnets at WAN" at interfaces>wan disabled as your routers in front have private IPs (shouldn't be neccessary but try if this makes a difference).

          1 Reply Last reply Reply Quote 0
          • A
            analyzerx
            last edited by

            I'm pretty pissed off with this so I removed all firewall rules, all port forwards and stuff and now have:

            LAN -> any
            WAN -> any

            and the portforward at port 3000 :P
            absolutelly nothin! o_O


            block private nets is disabled and so is the second WAN just in case it get things complicated…
            I don't get it... am I that stupid? o_O

            1 Reply Last reply Reply Quote 0
            • JeGrJ
              JeGr LAYER 8 Moderator
              last edited by

              Your rule on the WAN IF seems to be wrong. You want all incoming packets TO the WAN IF to go inside, not all packets FROM the WAN IF (there are not that much with source of WAN IF).

              Change it to something like:

              "from all to WAN IP"

              Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

              1 Reply Last reply Reply Quote 0
              • A
                analyzerx
                last edited by

                OW MY GOD I'LL CRY!!!

                I love you both! :P eheh~ ^_^
                Thanks guys… Grey thnx a million... ; )

                1 Reply Last reply Reply Quote 0
                • JeGrJ
                  JeGr LAYER 8 Moderator
                  last edited by

                  Your humble servant ;D
                  Always a pleasure.

                  Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                  1 Reply Last reply Reply Quote 0
                  • H
                    hoba
                    last edited by

                    Actually it is from source any to destination NAT IP. NAT is applied first, after that firewallrules are applied.

                    In you case your WAN rule should look like:
                    pass, interface WAN1, proto tcp, source IP any, sourceport any, destination IP 192.168.1.10, port 80 for the webserver example.

                    Btw, now as I look closer, why do you want to forward port 3000 to the pfsense's LAN IP itself? What is running at 3000? For these kind of things you only need to allow traffic to the WAN IP of the pfsense. no NAT rule is needed.

                    And another btw, it's always the easiest thing to let the pfSense create the firewallrules. Just make sure "autocreate firewall rule" at the bottom when adding a portforward is checked.

                    1 Reply Last reply Reply Quote 0
                    • JeGrJ
                      JeGr LAYER 8 Moderator
                      last edited by

                      Indeed a question, which slipped my attention. Shouldn't post after midnight make mental note

                      Right, you shouldn't need a NAT Rule for this, only if you want to redirect past pfsense to another network, you'll need these NAT redirects. But as I read your first post, you would like to RDR port 3000 to 192.168.1.90 so I suppose it was just a quick test, if rules work, wasn't it?

                      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                      1 Reply Last reply Reply Quote 0
                      • H
                        hoba
                        last edited by

                        I suggest restarting from scratch. Delete all firewall rules you made for the NATs so far. Also deleta all NATs. Then apply your settings.
                        After that add the portforwards just to the WAN1 and WAN2 as needed and let the firewallrules be autocreated. It's really not a very difficult task to get this running.  ;)

                        1 Reply Last reply Reply Quote 0
                        • JeGrJ
                          JeGr LAYER 8 Moderator
                          last edited by

                          I guess the Zyxel are DSL Routers (or they route somehow, but DSL modems normally don't hand out private IP ranges ;) )
                          I further guess - based on your information - your net looks something like that, eh?

                               NET           NET
                                |             |
                          +-----+-----+ +-----+-----+
                          | DSL-Router| | DSL-Router|
                          +--------+--+ +--+--------+
                             .3.1  |       | .2.1
                                   |       |
                             OPT1  |       | WAN
                                   |       |
                             .3.2  |       | .2.2
                                 +-+-------+-+
                                 |  PFSENSE  |
                                 +-----+-----+
                                       | 192.168.1.1
                                       |
                                       |          +--------------------+
                                       +----------+      Switch        |
                                                  +--------------------+        
                                                           |  |
                                               +----+      |  |      +----+
                                 192.168.1.90  + PC +------+  +------+ PC +  192.168.1.10
                                               +----+      |  |      +----+
                                                           |  |
                                              others ------+  +------ others (192.168.1.110)
                          
                          

                          So you have redundant (or two seperate) DSL lines. One should be WAN, the other OPT1 (as pfSense calls it). If thats the case, that shouldn't do much trouble. As hoba already said, just let pfSense create the rule of your NAT redirect, it normally knows how to do it right ;)
                          If it won't work, check both Zyxel, if they route all traffic to pfSense. And also watch the logs carefully (perhaps via SSH login and watching pflog output, too) why a packet is blocked (klicking on the little icon in pfSenses logview will tell you which rule caused it)

                          Hope that helps,
                          Grey

                          Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                          1 Reply Last reply Reply Quote 0
                          • A
                            analyzerx
                            last edited by

                            I'll start from scratch tomorrow morning in any case… ^_^
                            It works now and I've understood some stuff much better...

                            Grey the network is exactly like you drew it... (btw how did you do the diagram? :P)

                            Both your advice are excellent and I cannot thank you enough for your help! :)
                            My biggest mistake was mixxing up source and target networks... I was creating wrong firewall rules...
                            Allowing pfsense to make the rules would be easy indeed... but it didn't work the first time I tried it, (some other mistake) so I gave up on it! :P)
                            hehe~

                            ps. hoba the 3000 port is just a test! :P my ISP doesn't allow ports 80,81 and 8080 to be used so I had to play with something else until my static ips kick in! :P

                            Thanks again guys!

                            1 Reply Last reply Reply Quote 0
                            • JeGrJ
                              JeGr LAYER 8 Moderator
                              last edited by

                              As you like to say "I did it from scratch" - so to speak. I just like things to be crystal clear when it comes to network problems ;) So I have a few small ASCII text network diagrams ready to explain things better than only writing the facts :) Just a faible - but a helpful one. It helps me understand problems and others explaining my faults in guessing the facts  ;D

                              So I'm glad it was helpful.
                              Greets
                              Grey

                              Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                              1 Reply Last reply Reply Quote 0
                              • H
                                hoba
                                last edited by

                                You have them "ready"? Great, you should post them somewhere so people can refere to it or copy and paste to describe things  :D

                                1 Reply Last reply Reply Quote 0
                                • JeGrJ
                                  JeGr LAYER 8 Moderator
                                  last edited by

                                  I'll try to make a few for different setups :) Only have to think 'bout where to put them. Any hint?

                                  Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    analyzerx
                                    last edited by

                                    I could uploaded them on my server with your name and stuff if you'd like… :)
                                    Just contact me! :)

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.