1
General Discussion / Re: OPNsense rule chaining challenge
« on: April 11, 2020, 05:54:50 pm »
Ok, I found the problem and solution. It is working as intended now.
Solution requires 2 additional configurations entries:
1) Firewall > NAT > Outbound: public IPs do not need a NAT rule, explicitly disabled this.
Add rule:
Interface: WAN
select: "Do not NAT" (tick the box)
Source address: 121.22.0.99/32 (or 121.22.0.0/24)
Comment: "Do not NAT public subnet/host"
2) Firewall > Virtual IPs > Settings (Proxy ARP for public subnet host or range)
Add entry:
Mode: Proxy ARP
Interface: WAN
Type: Network
Address: 121.22.0.0/24 (or /32 if a single IP required)
Comments: "Public subnet range/host"
After this, NAT Port forwarding and NAT 1:1 work flawlessly utilising a public IP range.
Of course, the WAN interface still requires a rule that allows it to access the IP: 10.0.0.33/32 on OPT1.
Viel spaß damit.
Solution requires 2 additional configurations entries:
1) Firewall > NAT > Outbound: public IPs do not need a NAT rule, explicitly disabled this.
Add rule:
Interface: WAN
select: "Do not NAT" (tick the box)
Source address: 121.22.0.99/32 (or 121.22.0.0/24)
Comment: "Do not NAT public subnet/host"
2) Firewall > Virtual IPs > Settings (Proxy ARP for public subnet host or range)
Add entry:
Mode: Proxy ARP
Interface: WAN
Type: Network
Address: 121.22.0.0/24 (or /32 if a single IP required)
Comments: "Public subnet range/host"
After this, NAT Port forwarding and NAT 1:1 work flawlessly utilising a public IP range.
Of course, the WAN interface still requires a rule that allows it to access the IP: 10.0.0.33/32 on OPT1.
Viel spaß damit.