• H.323 Video Conference Codec behind PFSense *Guide / Explanation*

    Pinned Locked
    3
    0 Votes
    3 Posts
    25k Views
    D

    Long story short, to use H.323 behind a pfsense firewall, one needs to enable static-port NAT.

    Unfortunately neither H.323 nor SIP were designed with NAT in mind, in which case one needs either an ALG (which btw is part of Linux's netfilter since many years, but apparently missing from baseline pf/FreeBSD) or a NAT device that won't rewrite ports (a solution that will work if you only have one such device).

    Edit: Note that SIP software has been improved in recent years, and most recent implementations can work through NAT without a need for ALG or static ports, but it's still something one has to keep in mind when troubleshooting SIP issues.

  • Port Forward Troubleshooting

    Pinned Locked
    1
    3 Votes
    1 Posts
    30k Views
    No one has replied
  • FreePBX & pfsense

    3
    0 Votes
    3 Posts
    86 Views
    N

    @STEPHANK Freepbx runs fine behind pfsense in various setups and is rather straight forward to configure
    In general not much is needed and in most cases not even any port forwards too.

    Do describe your configuration and setup.

  • NAT public IP through multi way

    2
    0 Votes
    2 Posts
    32 Views
    V

    @lukeluke1979
    There is no need to assign the public IP to sn interface. Just add NAT rules on both WANs with custom translation address.

  • Outbound NAT over IPSEC tunnel not working

    7
    0 Votes
    7 Posts
    40 Views
    S

    @viragomann said in Outbound NAT over IPSEC tunnel not working:

    @shaunmccloud said in Outbound NAT over IPSEC tunnel not working:

    And the minute I add a P2 entry in my pfSense box for a remote network of 0.0.0.0/0, all network traffic but local dies.

    So I'd assume, that the traffic is routed over the VPN, but not out on WAN.

    But this is only the half of the battle. The traffic must be natted on the remote site

    If the Meraki doesn't masquerade your subnets there is no way to go out to the internet through it.

    I decided to cheat, and throw a virtual pfSense box in the data center to connect to. I'll see how that works tomorrow.

  • Simple port forward error default deny rule ipv4

    6
    0 Votes
    6 Posts
    85 Views
    johnpozJ

    @TheCalvinator glad to hear finally sorted. Thanks.

  • Local DMZ to filter traffic for game server.(Category may be wrong)

    1
    0 Votes
    1 Posts
    21 Views
    No one has replied
  • SNAT IPsec not work

    13
    0 Votes
    13 Posts
    274 Views
    A

    @viragomann

    Morning my friend, some news about topic?

  • Upnp issue

    6
    0 Votes
    6 Posts
    191 Views
    G

    @Yasir Yeah, well unfortunately that's the way it's implemented so unless you can push for and get an update/improvement of the implementation, a script is the only other solution.

  • "NAT Reflection mode for port forwards" option

    1
    0 Votes
    1 Posts
    48 Views
    No one has replied
  • Cant DNAT to ovpn client

    3
    0 Votes
    3 Posts
    65 Views
    A

    @viragomann Thank you very much. you helped me understand very good whats going on.
    Moreover i managed to to make it wotk bu adding an snat outbound rule to the openvpn interface. thanks again.

  • SIP client on LAN ignoring 401 Unauthorized packet

    5
    0 Votes
    5 Posts
    129 Views
    w0wW

    @Zak-McKracken
    If the issue is suspected to be with the external IP and the Ricoh firmware, then it might be worth trying siproxd.

  • Host Website over IPsec to a QNAP

    3
    0 Votes
    3 Posts
    89 Views
    N

    @viragomann Thanks. going to do some reading up on this before I kills my pfselnse.

  • pfSense with port forward AND outbound NAT - rewrite source IP address

    7
    0 Votes
    7 Posts
    228 Views
    J

    @johnpoz said in pfSense with port forward AND outbound NAT - rewrite source IP address:

    @jarlel said in pfSense with port forward AND outbound NAT - rewrite source IP address:

    WHY? Because the DNS servers have different filters based on which source IPs the request comes from

    Even if you get that to work - you have a problem with the answers being cached in unbound.

    client A asks for something.tld, which is allowed for client A.

    Now client B asks for something.tld which should be blocked for client B, but unbound already has it cached, so it sends client B the answer.

    There is no difference in the filters for clients in the same "client group". All clients using VIP 1 as DNS-server has the same filter/rules. All clients using VIP 2 as DNS-server has the same filter/rules.

    The DNS-server is a public one with some special services/filtering, so all requests are considered and evaluated without caching.

  • Packets are not NAT'ted and encrypted when sent over IPSec2 interface

    9
    0 Votes
    9 Posts
    193 Views
    B

    @stephenw10

    Let me know if you need any info.

  • Redirecting all DNS Requests to pfSense?

    12
    0 Votes
    12 Posts
    3k Views
    MarinSNBM

    @Gertjan Thank you so much!

  • NAT 1:1 through Wireguard

    8
    0 Votes
    8 Posts
    196 Views
    _

    @viragomann said in NAT 1:1 through Wireguard:

    @_deadpool_
    It should work with an 1:1 like this:
    interface: WG (you wrote above you have assigned OPT1 to the wg instance)
    External subnet IP: 172.16.1.0
    internal IP: Network > 192.168.1.0/24 (or LAN subnet)
    ...

    ok, i modified the configuration using the interface WireGuard instead of OPT1 as you stated, but i'm in the same situation. in the peer configuration the subnet is already allowed.

    @viragomann said in NAT 1:1 through Wireguard:

    ...

    However as mentioned, you have to ensure, that 172.16.1.0/24 is allowed in the remotes WG settings and firewall.

    ...

    i don't understand this, tou mean there is something to do at site A? i don't think so, as at site B if i use a mikrotik it works without touching site A configuration. if it means that i have to do something in firewall>rules at site B i don't understand what i'm missing, even in site B i can't ping machines in LAN using 172.16.1.0/24 class. pinging from site A shows in packet capture:

    17:44:47.026691 IP 172.16.0.1 > 172.16.1.1: ICMP echo request, id 8335, seq 7, length 64
    17:44:47.026710 IP 172.16.1.1 > 172.16.0.1: ICMP echo reply, id 8335, seq 7, length 64

    which seems that packets are arriving from site A and they get replied, nut pinging another machine existing and up i get no reply, like this:

    17:46:37.026691 IP 172.16.0.1 > 172.16.1.100: ICMP echo request, id 8335, seq 7, length 64

    pinging from site B the WG ip of site b pfsense i get:

    17:48:44.450593 IP 172.16.0.1 > 172.16.0.2: ICMP echo request, id 55040, seq 57612, length 36
    17:48:44.450614 IP 172.16.0.2 > 172.16.0.1: ICMP echo reply, id 55040, seq 57612, length 36

    and i get the same pinging every host in 172.16.0.0/24 subnet from site B.

    i still can't figure out what i'm missing.

  • DNS Port Forward Inglês DOES NOT REDIRECT

    13
    0 Votes
    13 Posts
    249 Views
    M

    @frawnsmoc said in DNS Port Forward Inglês DOES NOT REDIRECT:

    replace pfsense with mikrotik matter solved pfsense has this bug

    ok

  • NATting with Hybrid Outbound Not Working on a new Mapping entry

    5
    0 Votes
    5 Posts
    130 Views
    K

    @viragomann

    Yes the Public IP is assigned to that interface.

    I changed the Mappings to use the drop-down entry instead.

    Still did not work.

    Static Ports are in use because of VoIP Calls.
    If I do not use Static Ports, the calls end up with one-way audio.

    What did fix the Mapping issue is:
    I rebooted the pfSense this morning - then it started working as expected.

    I have seen issues with KEA DHCP resolved with reboots.
    But now also this...

    I should not have to be rebooting pfSense in production environments to make things work.
    I am quite disappointed with what I have been seeing with pfSense recently.

  • NAT 1:1

    3
    0 Votes
    3 Posts
    106 Views
    V

    @viragomann Ohhh wow, thank you :)

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.