ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Traffic not flowing for hosts behind NAT - Edge Router Lite

    IT Discussion
    edgerouter lite nat routing troubleshooting shouldvewenttojared
    5
    44
    8.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch
      last edited by

      This means you messed up the source and/or destination NAT rules.

      I am on my phone and cannot look at this carefully.

      I can also post examples of how to configure this from a working site.

      EddieJenningsE 1 Reply Last reply Reply Quote 1
      • EddieJenningsE
        EddieJennings @JaredBusch
        last edited by

        @jaredbusch said in Traffic not flowing for hosts behind NAT - Edge Router Lite:

        This means you messed up the source and/or destination NAT rules.

        I am on my phone and cannot look at this carefully.

        I can also post examples of how to configure this from a working site.

        I agree. I’ll look at it again after teaching tonight. I’m sure it’s staring back at me and for some reason I’m blind.

        1 Reply Last reply Reply Quote 0
        • EddieJenningsE
          EddieJennings
          last edited by EddieJennings

          To check my understanding of NAT.

          IIS Server

          • Public: 65.254.219.165
          • Private: 172.16.254.12

          PostFix Server

          • Public: 65.254.219.166
          • Private: 172.16.254.14

          Static 1:1 NAT is what's needed, and I'd have two rules for each host.

          Rule 1 would be destination NAT. A packet enters the eth0 interface bound for the public IP address for the intended server. The ERL translates the destination address of this packet to the private IP address of the intended server.

          Rule 2 would be a source NAT. A pack exits the eth0 interface bound for the Internet from a server with the source address as the server's private IP address. The ERL translates the source address of the pack to the public IP address of the server.

          So the above example for the IIS server would look like this.

          Rule 1. If a packet's destination is 65.254.219.165 is ingress to eth0, translate that packet's destination to 172.16.254.12, then send packet on to have firewall rules checked.

          Rule 2. If a packet's source is 172.16.254.12 is to egress from eth0, translate that packet's source to 65.254.219.165, then send the packet on its way.

          1 Reply Last reply Reply Quote 0
          • JaredBuschJ
            JaredBusch
            last edited by

            going to my office in a few minutes. will be able to help.

            1 Reply Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch
              last edited by

              Delayed by kids. Putting them to bed now though

              EddieJenningsE 1 Reply Last reply Reply Quote 0
              • EddieJenningsE
                EddieJennings @JaredBusch
                last edited by

                @jaredbusch said in Traffic not flowing for hosts behind NAT - Edge Router Lite:

                Delayed by kids. Putting them to bed now though

                Worry not. I’m turning early myself. As always, I appreciate the wisdom whenever it comes. 🙂

                JaredBuschJ 1 Reply Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @EddieJennings
                  last edited by

                  @eddiejennings said in Traffic not flowing for hosts behind NAT - Edge Router Lite:

                  @jaredbusch said in Traffic not flowing for hosts behind NAT - Edge Router Lite:

                  Delayed by kids. Putting them to bed now though

                  Worry not. I’m turning early myself. As always, I appreciate the wisdom whenever it comes. 🙂

                  They are going to bed. Not me.

                  anyway. post deluge incoming.

                  1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch
                    last edited by

                    Dashboard, view showing eth0 (WAN port)
                    0_1513050523901_1672375e-dddb-42a0-be51-3f07032d66ca-image.png

                    1 Reply Last reply Reply Quote 1
                    • JaredBuschJ
                      JaredBusch
                      last edited by JaredBusch

                      The Port forwarding rules only work against the first IP listed on the specified port.

                      In this case the .42 on eth0
                      FYI: .1.14 is the internal Exchange server and .0.20 is the HAProxy server for Exchange. I am only proxying SSL.
                      0_1513050729446_401daf94-f98e-4c6a-ac9b-76968c2e577a-image.png

                      1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch
                        last edited by JaredBusch

                        I have a few firewall groups setup

                        0_1513050921625_3d22fcc4-3909-4f7d-8c7a-9feae9f24177-image.png

                        1 Reply Last reply Reply Quote 0
                        • JaredBuschJ
                          JaredBusch
                          last edited by JaredBusch

                          The only LAN firewall rules are to block SMTP.
                          0_1513050590309_791de323-eb39-47f7-b3ed-6f58b411a277-image.png

                          1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch
                            last edited by JaredBusch

                            For anything you are going to NAT in to something other than the first IP address on the default masquerade, you have to have both firewall rules and NAT destination rules.

                            For anything that you want to go out something other than the default masquerade, you have to have a NAT source rule.

                            This is the WAN_IN and is likely part of your problem.
                            0_1513051040043_b1f33f73-c93c-4897-84c8-c90c83fd5c96-image.png

                            This is the NAT (source and destination) rules that are the other part of your problem.
                            0_1513051340820_6a93e582-b7f9-4598-92fb-2f9cfdcdb65f-image.png

                            1 Reply Last reply Reply Quote 0
                            • JaredBuschJ
                              JaredBusch
                              last edited by

                              For the screenshots above, the default NAT traffic will show a "What is my IP" as 12.XXX.XXX.42 as that is the first IP listed in the config of the eth0 port.

                              All traffic goes out through the default NAT masquerade (shown as order 4 in the Source NAT section) unless there is a Source NAT rule to override it.

                              As I have more than one thing happening here, we will just focus on the Nginx ones as the stuff not going through the default masquerade.

                              A Source NAT is used for outbound traffic. You are the source of the traffic.
                              A Destination NAT is used for inbound traffic. You are the destination of the traffic.

                              So to send traffic from the server with an internal IP address of 10.202.1.16 out the external IP address of 12.XXX.XXX.43 instead of the default masquerade external IP of 12.XXX.XXX.42 we need to make a Source NAT rule.

                              Make a rule and fill it out like this. Obviously, there are a lot more options here than I am going over. If you have multiple machines that you need to use this IP outbound, then create a firewall group and select the Src Address Group drop down instead of specifying the IP address as I did here.
                              0_1513052200070_28b7cb4c-bc2f-45c4-ae80-58239899fb8c-image.png

                              Now if you check your What is my IP from the specified server, it should return the 12.XX.XXX.43

                              1 Reply Last reply Reply Quote 0
                              • JaredBuschJ
                                JaredBusch
                                last edited by JaredBusch

                                The inbound is harder because you have to setup both a Destination NAT rule as well as allow it on the firewall's WAN_IN rule.

                                First make the Destination NAT rule as you are already on this screen from making the Source NAT rule.

                                As you can see you simply reverse what you did in the Source NAT rule. This time the local IP goes in the Translation and the WAN IP goes in the Dest Address field. Anything coming in on this destination IP will be translated to this local IP.

                                As you can also see, I further restricted this translation to only be TCP/UDP and only ports included in a firewall port group.

                                0_1513052577232_ad66034c-d43d-4dce-aebc-072f5dd30be5-image.png
                                0_1513052587003_916bd970-31a6-4adc-99eb-097d1d350ce5-image.png

                                In case you are curious, here are the ports in that firewall port group.
                                0_1513052906915_f6792677-5814-4a5e-9ea8-c8ab22567101-image.png

                                1 Reply Last reply Reply Quote 1
                                • JaredBuschJ
                                  JaredBusch
                                  last edited by JaredBusch

                                  Now make a firewall rule in the policy assigned to the IN direction of your WAN interface.

                                  The wizards name this rule WAN_IN by default.

                                  You want to make the settings match when it comes to the protocol and port settings. But the destination is now the internal IP address as the translation has already happened by the NAT rules before the firewall rules see it.

                                  0_1513053223292_0979e45b-c587-4b7b-bbff-07bef53a8db9-image.png
                                  0_1513053240643_e8a1811a-674e-4433-8ada-c2647a8cb0c8-image.png
                                  0_1513053251218_fe30d4c4-9110-4015-a93e-a12e4e2368f4-image.png
                                  0_1513053262992_8e208e9c-ec44-44ea-b8d0-f12b79720bd7-image.png
                                  0_1513053275234_e881ec67-7ce3-477a-ae07-e5e2d3aeb2ed-image.png

                                  1 Reply Last reply Reply Quote 0
                                  • JaredBuschJ
                                    JaredBusch
                                    last edited by JaredBusch

                                    Now you should have traffic properly flowing to and from your alternate IP addresses.
                                    And yes, I noticed..
                                    0_1513053369480_11bd0e28-df55-4e26-bc0e-9524265d64da-image.png

                                    EddieJenningsE 1 Reply Last reply Reply Quote 2
                                    • Mike DavisM
                                      Mike Davis
                                      last edited by

                                      Well done Jared.

                                      1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender
                                        last edited by

                                        When I tried this last night, my new NAT rules were all below the default masquerade one. I tried moving (click and drag) above but it wouldn't actually move.

                                        I then added a third rule (just some fake crap), then upon having three rules I was able to move my desired rule above the default one.

                                        I'm on firmware v1.9.7-hotfix.4

                                        EddieJenningsE 1 Reply Last reply Reply Quote 0
                                        • EddieJenningsE
                                          EddieJennings @JaredBusch
                                          last edited by

                                          @jaredbusch said in Traffic not flowing for hosts behind NAT - Edge Router Lite:

                                          Now you should have traffic properly flowing to and from your alternate IP addresses.

                                          Thanks for the above. I'm comparing that to my configuration now.

                                          And yes, I noticed..
                                          0_1513053369480_11bd0e28-df55-4e26-bc0e-9524265d64da-image.png

                                          Ah, then you know the commercials.

                                          1 Reply Last reply Reply Quote 1
                                          • EddieJenningsE
                                            EddieJennings @Dashrender
                                            last edited by

                                            @dashrender said in Traffic not flowing for hosts behind NAT - Edge Router Lite:

                                            When I tried this last night, my new NAT rules were all below the default masquerade one. I tried moving (click and drag) above but it wouldn't actually move.

                                            I then added a third rule (just some fake crap), then upon having three rules I was able to move my desired rule above the default one.

                                            I'm on firmware v1.9.7-hotfix.4

                                            Even though it didn't move, did the rule order number change?

                                            DashrenderD 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post