This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pfsense_nat [2022/01/31 01:34] – Gaelin | pfsense_nat [2022/01/31 01:42] (current) – Gaelin | ||
---|---|---|---|
Line 3: | Line 3: | ||
- | ==== 1:many NAT ==== | + | ===== 1:many NAT ===== |
This is where you have one public IP and multiple LAN ips. | This is where you have one public IP and multiple LAN ips. | ||
The WAN interface can be DHCP or static | The WAN interface can be DHCP or static | ||
- | {{ : | + | {{ : |
Set a static IP on the LAN | Set a static IP on the LAN | ||
- | {{:: | + | {{ :: |
Set Automatic outbound nat | Set Automatic outbound nat | ||
- | {{ :: | + | {{ :: |
Done | Done | ||
+ | ---- | ||
- | ==== 1:1 NAT ==== | + | |
+ | |||
+ | ===== 1:1 NAT ===== | ||
You do not have to specify static WAN ip but you really should! | You do not have to specify static WAN ip but you really should! | ||
- | {{ :: | + | {{ :: |
In this example the pfsense is on the blue team network (10.20.0.0/ | In this example the pfsense is on the blue team network (10.20.0.0/ | ||
Set static IP on the LAN | Set static IP on the LAN | ||
- | {{ :: | + | {{ :: |
Go to the NAT settings. Firewall > NAT > Add | Go to the NAT settings. Firewall > NAT > Add | ||
- | {{ :: | + | {{ :: |
Create a new rule mapping the first external address (in this case 10.20.123.1) to the first internal address (192.168.1.1) and use the subnet mask for the internal network (24) | Create a new rule mapping the first external address (in this case 10.20.123.1) to the first internal address (192.168.1.1) and use the subnet mask for the internal network (24) | ||
- | {{ :: | + | {{ :: |
+ | |||
+ | Finally you need to make the pfsense respond to ARP for those IPs. | ||
+ | Firewall > Virtual IPs > Add. | ||
+ | {{ :: | ||
+ | |||
+ | Done |