[SOLVED]I've beat my head against the wall: How do I do NO-NAT but HAVE FW rules

Started by lrosenman, March 28, 2022, 03:48:14 AM

Previous topic - Next topic
I need NO-NAT, but the ability to have firewall rules.  I've looked at past posts, and BELIEVE I've done everything right, but if pf is enabled, it does NOT pass traffic.  If I disable pf it works fine.

HELP.

attached is the current state

Hmmm, Firewall -> Settings -> Advances has

If you only want to disable NAT, and not firewall rules, visit the Outbound NAT page.

..and Firewall -> NAT -> Outbound says

Disable outbound NAT rule generation
(outbound NAT is disabled)
kind regards
chemlud
____
"The price of reliability is the pursuit of the utmost simplicity."
C.A.R. Hoare

felix eichhorns premium katzenfutter mit der extraportion energie

A router is not a switch - A router is not a switch - A router is not a switch - A rou....


If you do not NAT, devices on both (or more) sides of your OPNsense need to have appropriate routes configured.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

um this is a standard routing thing, with globally routable IP's. 

NOTE: If I just turn PF off, it routes JUST FINE.

I've been doing IPv4 networking for >30 years, and I've tried a thousand(estimate) things.

with PF enabled it doesn't work, with PF disabled it routes like it's supposed to.

Then post a live log entry of a blocked packet and the corresponding firewall rule that should have passed it, please.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

I posted the ENTIRE config, and NOTHING passes OUT. says blocked by default deny rule.

Please post the live log entry of a single blocked packet and a screenshot of the single firewall rule supposed to pass it - how am I supposed to make sense of a bunch of XML by staring at it?
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

anything that goes OUT to the WAN gets denied by default deny rule.

ANYTHING

and there are out rules for all interfaces with ANY ANY and all protocols, etc.

Most of the time you need IN rules to pass traffic.

The first packet of any given flow arrives at an interface. That's IN from the firewall's point of view. Once that gets passed by the rule, a state is set up to pass packets in the matching return direction until the flow terminates.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

there are those too.  and the established etc TCP sessions should allow it.

LITERALLY NOTHING GOES OUT FROM THE LAN TO THE WAN WITH PF ON. 

I'VE BEEN DOING THIS FOR A LONG TIME.

https://www.lerctr.org/~ler/wan_rules.png
https://www.lerctr.org/~ler/LAN_rules.png


"Reject private networks" in your interface settings?

You still have not shown a live log entry of a rejected packet.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Um, these are *NOT* private IP's.  (192.147.25.0/24, 216.82.192.224/28)

and I don't have one currently and if I turn PF back on, I will *LOSE* access to it, as it's in a colo
20 miles away.


first try to disable reply-to : Firewall: Settings: Advanced --> Disable reply-to

If that doesn't work, try not to comment in capitals (shouting unlikely brings you closer to a solution   :) ) and do as @pmhausen suggested, collect relevant details using live log. Traffic capture is usually also a good tool to see where traffic is heading (download the pcap in wireshark for more details)

Best regards,

Ad