The summary of ‘Port Forwarding and NAT Reflection in pfSense – REUPLOAD’

This summary of the video was created by an AI. It might contain some inaccuracies.

00:00:0000:12:45

In this video, the presenter shares their experience transitioning to a new fiber-to-the-property (FTTP) internet service offering 1 gigabit speeds for both upload and download, significantly improving server operations. Central to the discussion is the configuration of port forwarding using pfSense to make a FreeBSD 13.2 machine running NGINX accessible externally. They provide step-by-step instructions on setting up port forwarding rules, configuring TCP traffic redirection, and using NAT rules for efficient packet handling.

Throughout the demonstration, the presenter addresses and troubleshoots various issues, including ensuring the correct traffic redirection and managing DNS rebinding protection settings. Additional configurations, such as disabling problematic redirect rules and correctly setting up SSH access, are meticulously covered to optimize the server's external accessibility.

The video concludes with the presenter encouraging viewer engagement through likes, comments, and subscriptions, while apologizing for any delays in responding to comments due to personal circumstances.

00:00:00

In this part of the video, the presenter discusses switching to a new internet service provider offering fiber to the property (FTTP), which provides a synchronous connection with both 1 gigabit download and upload speeds. This enhanced connection allows for more advanced server operations, prompting a focus on port forwarding using pfSense. The presenter uses a FreeBSD 13.2 machine running NGINX as an example and demonstrates accessing it locally via Chrome. To make the NGINX server accessible from the outside world, the presenter explains the setup of port forwarding rules in pfSense, specifically adding rules for SSH access, while noting the temporary nature of these configurations for security concerns.

00:03:00

In this part of the video, the speaker demonstrates setting up a rule to allow traffic to be redirected using TCP protocol on Port 80. They detail how to remap it to another port if desired, and specify the redirect target IP address. The description and necessity of reflection are touched upon, explaining how the firewall processes incoming requests and the importance of ensuring correct traffic redirection, particularly from outside the network. They create and save the rule, highlighting pfSense’s feature to modify rules before application. The speaker tests the configuration by turning off Wi-Fi on their phone, confirming the setup works correctly. Finally, they start discussing the different available choices for n reflection in pfSense.

00:06:00

In this part of the video, the presenter discusses using a helper program to send packets to the target of a port forward, leveraging NAT (Network Address Translation) rules in PF (Packet Filter) for better scalability. There is an emphasis on accurately determining the interface and gateway IP address used for communication. The presenter enables the “automatic outbound NAT for reflection” option to mask the source of traffic for proper flow back. They proceed to apply this setting and test it, but encounter issues with traffic behavior and decide to use the DNS resolver settings to exclude a domain from DNS rebinding protection. The process involves updating custom options in the DNS resolver settings, followed by testing to see if it resolves the issue.

00:09:00

In this part of the video, the presenter discusses configuring port forwarding and addresses an issue with the web configurator redirect rule. They explain that disabling this rule resolves the problem. To demonstrate, the presenter sets up port forwarding for SSH (Port 22), logging into the remote host and then using SSH to connect back to their PC. They note a troubleshooting step involving the correct port number. The segment concludes with ensuring the redirection rule is properly set without conflicts, summarizing that this setup now allows them to bring their remote server back effectively.

00:12:00

In this part of the video, the speaker expresses hope that viewers will find the content useful, encourages them to give a thumbs up, and leave comments. They apologize for not being able to respond to comments promptly due to current chaos but assure viewers they will start replying soon. The speaker also encourages viewers to subscribe for notifications on new video releases, typically once a week, and promises to see them in the next video.

Scroll to Top