1
20.1 Legacy Series / Re: Issues with getting on the internet using static external ips and 1to1 nat
« on: June 30, 2020, 08:47:53 pm »
Alright so sorta still issues happening.
Since Floating Rules is by default where device interfaces are kinda being used for firewall rules I had to create Firewall Rules to allow any traffic which then allowed the External/Public Ip's to work internal Side but alot of traffic is still blocked. I noticed i also had to create rules inside Lan, Wan, External Nics with allow any rules to further allow more traffic but im unable to connect directly to my Public IPs inside my External nic when i use a static Public IP on a device. If i set a static private IP on the device then 1to1 nat to the external IP then it seems to open it up more for remote connecting.
when i compare it to my pfsense setup it works as intended. What im noticing is the default generated firewall rules block way to much by default. not being able to delete or modify them is a pain. even though i have created manual rules the auto generated rules according to documention will still overide my manual rules which doesnt make sense.
https://docs.opnsense.org/manual/firewall.html
Internally rules are registered using a priority, floating uses 200000, groups use 300000 and interface rules land on 400000 combined with the order in which they appear. Automatic rules are usually registered at a higher priority (lower number).
what im noticing between Pfsense and Opnsense is that they may be similar in looks and setup but they act way differently even when setup basically the same.
How can i access my Public IP's internal remotely when i assaign a static IP to the device. It can get on the net. it knows what IP it has via whatsmyip.org but i cannot connect to the device remotely or access certain ports remotely.
Since Floating Rules is by default where device interfaces are kinda being used for firewall rules I had to create Firewall Rules to allow any traffic which then allowed the External/Public Ip's to work internal Side but alot of traffic is still blocked. I noticed i also had to create rules inside Lan, Wan, External Nics with allow any rules to further allow more traffic but im unable to connect directly to my Public IPs inside my External nic when i use a static Public IP on a device. If i set a static private IP on the device then 1to1 nat to the external IP then it seems to open it up more for remote connecting.
when i compare it to my pfsense setup it works as intended. What im noticing is the default generated firewall rules block way to much by default. not being able to delete or modify them is a pain. even though i have created manual rules the auto generated rules according to documention will still overide my manual rules which doesnt make sense.
https://docs.opnsense.org/manual/firewall.html
Internally rules are registered using a priority, floating uses 200000, groups use 300000 and interface rules land on 400000 combined with the order in which they appear. Automatic rules are usually registered at a higher priority (lower number).
what im noticing between Pfsense and Opnsense is that they may be similar in looks and setup but they act way differently even when setup basically the same.
How can i access my Public IP's internal remotely when i assaign a static IP to the device. It can get on the net. it knows what IP it has via whatsmyip.org but i cannot connect to the device remotely or access certain ports remotely.