Site Tools


pfsense_nat

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
pfsense_nat [2022/01/31 01:34] Gaelinpfsense_nat [2022/01/31 01:42] (current) Gaelin
Line 3: Line 3:
  
  
-==== 1:many NAT ====+===== 1:many NAT =====
 This is where you have one public IP and multiple LAN ips. This is where you have one public IP and multiple LAN ips.
  
 The WAN interface can be DHCP or static The WAN interface can be DHCP or static
-{{ :pfsense_dhcp.png?nolink&400|}}+{{ :pfsense_dhcp.png?nolink&300 |}}
 Set a static IP on the LAN Set a static IP on the LAN
-{{ ::pfsense_lan.png?nolink&400|}}+{{ ::pfsense_lan.png?nolink&500 |}}
  
  
 Set Automatic outbound nat Set Automatic outbound nat
-{{ ::pfsense_1:many_nat.png?nolink&400|}}+{{ ::pfsense_1:many_nat.png?nolink&300 |}}
  
 Done Done
  
 +----
  
-==== 1:1 NAT ====+ 
 + 
 +===== 1:1 NAT =====
 You do not have to specify static WAN ip but you really should! You do not have to specify static WAN ip but you really should!
-{{ ::pfsense_static.png?nolink&400|}}+{{ ::pfsense_static.png?nolink&500 |}}
 In this example the pfsense is on the blue team network (10.20.0.0/16) with the static IP 10.20.123.1/16 In this example the pfsense is on the blue team network (10.20.0.0/16) with the static IP 10.20.123.1/16
  
 Set static IP on the LAN Set static IP on the LAN
-{{ ::pfsense_lan.png?nolink&400 |}}+{{ ::pfsense_lan.png?nolink&500 |}}
  
 Go to the NAT settings. Firewall > NAT > Add Go to the NAT settings. Firewall > NAT > Add
-{{ ::pfsense_nat_blank.png?nolink&400 |}}+{{ ::pfsense_nat_blank.png?nolink&300 |}}
  
 Create a new rule mapping the first external address (in this case 10.20.123.1) to the first internal address (192.168.1.1) and use the subnet mask for the internal network (24) Create a new rule mapping the first external address (in this case 10.20.123.1) to the first internal address (192.168.1.1) and use the subnet mask for the internal network (24)
-{{ ::pfsense_1:1_nat_rule.png?nolink&400 |}}+{{ ::pfsense_1:1_nat_rule.png?nolink&500 |}}
  
 +
 +Finally you need to make the pfsense respond to ARP for those IPs.
 +Firewall > Virtual IPs > Add.
 +{{ ::pfsense_proxy_arp.png?nolink&400 |}}
 +
 +Done
pfsense_nat.1643592870.txt.gz · Last modified: 2022/01/31 01:34 by Gaelin