Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to expose a local lan ip to the internet?

    Scheduled Pinned Locked Moved Firewalling
    8 Posts 5 Posters 5.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      eagleeye
      last edited by

      Hi
      I am new to Pfsense and I have been looking for how to
      create a 'simple Dmz' kind of setup.. like a cheap linksys router
      where you can specify an IP for a 'DMZ' this IP is in the lan
      say 192.168.1.101 and its fully exposed to the internet.

      I have been searching through so many documents but
      nothing seems to be talking about what I want to do..

      I have created some firewall WAN rules that says
      any protocol , any source, any port , goes to 192.168.1.101

      However I did a remote desktop test to the WAN IP but
      it did not work.

      I need to do a couple of these kinds of setup to get things
      going first. I don't care about security, I just want 2 IP.s
      fully exposed to the internet.

      Can someone help me on this?

      Eagleeye?

      1 Reply Last reply Reply Quote 0
      • S
        Sh4
        last edited by

        Your rule will not put a dmz on the machine but instead route all traffic to this machine, however if it didn't work you probably did it the wrong way, I suspect the default rule blocking private networks traffic is blocking you for some reason.

        Try it the proper way first by specifying a protocol and port number routed to your machine (ie the rdp port).

        If you really want a DMZ the clean way is a dedicated DMZ interface since the wildcardeds rules will not interfere with the other machines of the same network.

        pfSense 1.2
        24x [DELL PowerEdge 1950 III]
        -2x Quad Core Intel Xeon E5420 2.5GHz
        -8GB FB 667MHz Memory (4x2GB) Memory RAID 2x4GB
        -PERC 6/i RAID Controller
        -Intel® PRO 1000PT Dual Port PCIe x4

        1 Reply Last reply Reply Quote 0
        • S
          sai
          last edited by

          you will need to add a NAT rule also.

          1 Reply Last reply Reply Quote 0
          • JeGrJ
            JeGr LAYER 8 Moderator
            last edited by

            That sounds like a job for a 1:1 NAT Rule..

            (..and to hell with those "cheap router documentation" for using the word "DMZ" for sth like a 1:1 NAT or a fully exposed host. That has brought so many problems to customers I can't count them anymore >:()

            Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

            If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

            1 Reply Last reply Reply Quote 0
            • E
              eagleeye
              last edited by

              @Grey:

              That sounds like a job for a 1:1 NAT Rule..
              …

              Hi Thanks to all that helped, I will try it out later…

              BTW 1:1 NAT does not  allow ...  to local IP. So it seems
              there is no way to configure ANY IP to a local IP using 1:1 NAT.
              Maybe you can elaborate, I am interested !

              I have to use "linksys DMZ Host"  until I find time to do it 'properly'

              Eagleeye

              1 Reply Last reply Reply Quote 0
              • B
                blak111
                last edited by

                The 1:1 NAT will map all traffic from an outside address to an inside address regardless of where it comes from.

                1 Reply Last reply Reply Quote 0
                • JeGrJ
                  JeGr LAYER 8 Moderator
                  last edited by

                  That's what I thought he wanted when he was saying "expose 2 IPs to the internet". But now after reading it again I wonder, if he wants two internal IPs exposed to the internet (with only one external). That's a no go. You can't simply forward all traffic from the outside to two internal IPs - that would be like "copying" traffic and neither of the internal hosts would know if that traffic is meant for him.

                  Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                  1 Reply Last reply Reply Quote 0
                  • E
                    eagleeye
                    last edited by

                    @blak111:

                    The 1:1 NAT will map all traffic from an outside address to an inside address regardless of where it comes from.

                    Ah yes , thats what I thought, 1:1 NAT does NOT allow the specifying of ... as the Source IP
                    to the internal address of 192.168.1.11 for example.
                    Since the source user does NOT have a Fixed IP address this wont work.

                    OK I realize now that to have 2 IPs configured to have any incoming source 
                    does not make sense because the FW will not know how to forward the traffic.

                    Eagleeye

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.