Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Topics - bsdkilla

#1
I wish to have a Port Forward to be active only for a specific time range, unfortunately this is not possible in OpnSense, but it does offer time Schedules on regular Firewall Rules.

So my thought was to setup a Firewall rule on the VLAN to "local tag" the traffic I am interested in.  This works and I can see the tag applied when viewing the Live View log.

Second step is to create the Port Forward on WAN and have it match the "local tag" set by the rule above from the VLAN.  However this does not work.

It seems that the processing order of NAT then afterwards Firewall Rules applies globally across all interfaces, eg:

VLAN & WAN
1)   NAT
2)   Firewall Rules

Which means the idea of tagging via a rule then using it to match on the Port Forward is not going to work.

I was expecting it to apply locally across each Interface, eg:

VLAN
1)   NAT
2)   Firewall Rules  <-- rule sets local tag
WAN
3)   NAT  <-- port forward matches local tag
4)   Firewall Rules


Can anyone clarify this or have any suggestion on how this could be made to work?



#2
Running OpnSense 19.7.4

How can I configure OpnSense so all LAN traffic going to a specific destination port is redirected to a target IP on the LAN?

So if we have LAN IP 192.168.1.10 accessing an external IP address on port 3000, we want it redirected to target LAN IP 192.168.1.20:3000

I have tried configuring Outbound NAT but can't get this working and it seems this is broken in 19.7.x.  Can someone run me through the configuration steps in case I am doing something stupid?