Hi, Here is what you requested.
################# ## rules.debug ## ################# # System Aliases loopback = "{ lo0 }" lan = "{ em0 }" wan = "{ em1 }" enc0 = "{ enc0 }" # User Aliases set loginterface em1 set loginterface em0 set optimization normal scrub all random-id fragment reassemble nat-anchor "pftpx/*" nat-anchor "natearly/*" nat-anchor "natrules/*" # FTP proxy rdr-anchor "pftpx/*" # Outbound NAT rules nat on $wan from 10.30.1.0/24 port 500 to any port 500 -> (em1) port 500 nat on $wan from 10.30.1.0/24 port 5060 to any port 5060 -> (em1) port 5060 nat on $wan from 10.30.1.0/24 to any -> (em1) #SSH Lockout Table table <sshlockout> persist # Load balancing anchor - slbd updates rdr-anchor "slb" # FTP Proxy/helper table <vpns> { } no rdr on em0 proto tcp from any to <vpns> port 21 rdr on em0 proto tcp from any to any port 21 -> 127.0.0.1 port 8021 # NAT Inbound Redirects rdr on em1 proto udp from any to 216.139.33.155/32 port 5060:5080 -> 10.30.1.71 port 5060:* rdr on em1 proto udp from any to 216.139.33.155/32 port 10001:20000 -> 10.30.1.71 port 10001:* rdr on em1 proto tcp from any to 216.139.33.155/32 port { 80 } -> 10.30.1.71 # IMSpector rdr anchor rdr-anchor "imspector" # UPnPd rdr anchor rdr-anchor "miniupnpd" anchor "ftpsesame/*" anchor "firewallrules" # We use the mighty pf, we cannot be fooled. block quick proto { tcp, udp } from any port = 0 to any block quick proto { tcp, udp } from any to any port = 0 # snort2c table <snort2c> persist block quick from <snort2c> to any label "Block snort2c hosts" block quick from any to <snort2c> label "Block snort2c hosts" # loopback anchor "loopback" pass in quick on $loopback all label "pass loopback" pass out quick on $loopback all label "pass loopback" # package manager early specific hook anchor "packageearly" # carp anchor "carp" # permit wan interface to ping out (ping_hosts.sh) pass quick proto icmp from 216.139.33.154 to any keep state # NAT Reflection rules # allow access to DHCP server on LAN anchor "dhcpserverlan" pass in quick on $lan proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server on LAN" pass in quick on $lan proto udp from any port = 68 to 10.30.1.1 port = 67 label "allow access to DHCP server on LAN" pass out quick on $lan proto udp from 10.30.1.1 port = 67 to any port = 68 label "allow access to DHCP server on LAN" block in log quick on $wan proto udp from any port = 67 to 10.30.1.0/24 port = 68 label "block dhcp client out wan" pass in quick on $wan proto udp from any port = 67 to any port = 68 label "allow dhcp client out wan" # LAN/OPT spoof check (needs to be after DHCP because of broadcast addresses) antispoof for em0 anchor "spoofing" # block anything from private networks on WAN interface anchor "spoofing" antispoof for $wan block in log quick on $wan from 10.0.0.0/8 to any label "block private networks from wan block 10/8" block in log quick on $wan from 127.0.0.0/8 to any label "block private networks from wan block 127/8" block in log quick on $wan from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12" block in log quick on $wan from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16" # Support for allow limiting of TCP connections by establishment rate anchor "limitingesr" table <virusprot> block in quick from <virusprot> to any label "virusprot overload table" # let out anything from the firewall host itself and decrypted IPsec traffic pass out quick on $lan proto icmp keep state label "let out anything from firewall host itself" pass out quick on $wan proto icmp keep state label "let out anything from firewall host itself" pass out quick on em1 all keep state label "let out anything from firewall host itself" # pass traffic from firewall -> out anchor "firewallout" pass out quick on em1 all keep state label "let out anything from firewall host itself" pass out quick on em0 all keep state label "let out anything from firewall host itself" pass out quick on $enc0 keep state label "IPSEC internal host to host" # make sure the user cannot lock himself out of the webGUI or SSH anchor "anti-lockout" pass in quick on em0 from any to 10.30.1.1 keep state label "anti-lockout web rule" # SSH lockout block in log proto tcp from <sshlockout> to any port 22 label "sshlockout" anchor "ftpproxy" anchor "pftpx/*" pass quick proto carp pass quick proto pfsync # User-defined aliases follow # User-defined rules follow pass in quick on $wan proto tcp from any to { 10.30.1.70 } port = 80 keep state label "USER_RULE: NAT Interface for weather and platypus-public" pass in quick on $lan from 10.30.1.0/24 to any keep state label "USER_RULE: Default LAN -> any" pass in quick on $wan proto udp from any to { 10.30.1.71 } port 5059 >< 5081 keep state label "USER_RULE: NAT SIP" pass in quick on $wan proto udp from any to { 10.30.1.71 } port 10000 >< 20001 keep state label "USER_RULE: NAT RTP" pass in quick on $wan proto tcp from any to { 10.30.1.71 } port = 80 keep state label "USER_RULE: NAT java.garlic.com - Trixbox Server" # VPN Rules pass in quick on em0 inet proto tcp from any to $loopback port 8021 keep state label "FTP PROXY: Allow traffic to localhost" pass in quick on em0 inet proto tcp from any to $loopback port 21 keep state label "FTP PROXY: Allow traffic to localhost" pass in quick on em1 inet proto tcp from port 20 to (em1) port > 49000 flags S/SA keep state label "FTP PROXY: PASV mode data conn ection" # enable ftp-proxy # IMSpector anchor "imspector" # uPnPd anchor "miniupnpd" #--------------------------------------------------------------------------- # default rules (just to be sure) #--------------------------------------------------------------------------- block in log quick all label "Default block all just to be sure." block out log quick all label "Default block all just to be sure." ########################### ### NAT from config.xml ### ########################### <nat> <ipsecpassthru> <enable/> </ipsecpassthru> <rule> <external-address>216.139.33.155</external-address> <protocol>udp</protocol> <external-port>5060-5080</external-port> <target>10.30.1.71</target> <local-port>5060</local-port> <interface>wan</interface> <descr>SIP</descr> </rule> <rule> <external-address>216.139.33.155</external-address> <protocol>udp</protocol> <external-port>10001-20000</external-port> <target>10.30.1.71</target> <local-port>10001</local-port> <interface>wan</interface> <descr>RTP</descr> </rule> <rule> <external-address>216.139.33.155</external-address> <protocol>tcp</protocol> <external-port>80</external-port> <target>10.30.1.71</target> <local-port>80</local-port> <interface>wan</interface> <descr>java.garlic.com - Trixbox Server</descr> </rule> </nat> What else can I provide? Thanks again! - Patrick > Can you send your rules.debug and NAT and rules config.xml portions from > status.php? > > > Patrick wrote: >> Hi all, >> >> Fresh install of the latest pfsense, I initially set up some NAT port >> forwarding, removed them, and tried to re-add them. Unfortunately the >> 2nd time around none of my NAT forwarding works. >> >> I have even tried rebooting the machine as well, and the firewall rules >> still wont work. I tried to forward a Virtual IP's http and tftp ports >> to a box internal to the pfsense firewall, but none of them are working. >> >> The only fix I have found is to reinstall pfsense, but that kinda >> defeats the whole purpose. Is there something I'm not doing that is >> preventing these from working? I make sure to hit apply changes in the >> NAT area as well. >> >> If I can provide something else to help troubleshoot this, please let me >> know. >> >> Thanks! >> >> - Patrick >> > >