Configuração 1: 1 NAT usando pfSense

4

caixa pfSense:

  • IPs públicos 208.43.30.118-.117
  • IP privado: 192.168.1.1

Eu preciso fornecer o mapeamento NAT 1: 1 para uma VM na rede privada 192.168.1.5

Não consigo obter o NAT 1: 1 funcionando, embora deva ser direto ...

A saída de

$ pfctl -s rules
scrub in on em0 all fragment reassemble
scrub in on em1 all fragment reassemble
anchor "relayd/*" all
block drop in log all label "Default deny rule"
block drop out log all label "Default deny rule"
block drop in quick inet6 all
block drop out quick inet6 all
block drop quick proto tcp from any port = 0 to any
block drop quick proto tcp from any to any port = 0
block drop quick proto udp from any port = 0 to any
block drop quick proto udp from any to any port = 0
block drop quick from <snort2c> to any label "Block snort2c hosts"
block drop quick from any to <snort2c> label "Block snort2c hosts"
block drop in log quick proto carp from (self) to any
pass quick proto carp all keep state
pass quick proto pfsync all keep state
block drop in log quick proto tcp from <sshlockout> to any port = ssh label "sshlockout"
block drop in log quick proto tcp from <webConfiguratorlockout> to any port = http label "webConfiguratorlockout"
block drop in quick from <virusprot> to any label "virusprot overload table"
block drop in log quick on em0 from <bogons> to any label "block bogon networks from WAN"
block drop in on ! em0 inet from 208.43.30.112/29 to any
block drop in inet from 208.43.30.118 to any
block drop in inet from 208.43.30.117 to any
block drop in on ! em1 inet from 192.168.1.0/24 to any
block drop in inet from 192.168.1.1 to any
block drop in on em0 inet6 from fe80::250:56ff:fe8b:571e to any
block drop in on em1 inet6 from fe80::250:56ff:fe8b:571f to any
pass in on lo0 all flags S/SA keep state label "pass loopback"
pass out on lo0 all flags S/SA keep state label "pass loopback"
pass out all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
pass out route-to (em0 208.43.30.113) inet from 208.43.30.118 to ! 208.43.30.112/29 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
pass in quick on em1 proto tcp from any to (em1) port = http flags S/SA keep state label "anti-lockout rule"
anchor "userrules/*" all
pass in quick on em0 reply-to (em0 208.43.30.113) inet proto tcp from any to 192.168.1.5 port = http flags S/SA keep state label "USER_RULE: allow webtraffic"
pass in quick on em1 inet from 192.168.1.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule"
anchor "tftp-proxy/*" all

Eu tentei configurá-lo algumas vezes com a porta em frente, bem como 1: 1 NAT, mas o tráfego não encaminha para o IP interno. O que estou fazendo errado?

Descrição de IP de destino de IP interno de IP de interface externa

WAN 208.43.30.117 LAN net 192.168.1.5 encaminhar externo para ip interno

O ip adicional é apenas um alias de ip (ip virtual) Eu já tinha adicionado a regra NAT 1: 1 antes de enviar a saída do comando via gui Por que isso não está refletido na saída postada

    
por siva2guru 28.10.2011 / 20:10

1 resposta

2

O erro que cometi foi não configurar o gateway do cliente para apontar para o pfsense.

O cliente nat tinha várias placas de rede e o gateway padrão foi definido para outra placa de rede.

Após a correção, o problema foi resolvido

    
por 31.12.2011 / 18:42