- Go to Firewall > Virtual IP and Create a Virtual IP as CARP, with
your x.y.18.20
- Go to Firewall > NAT and set Manual Outbound NAT rule generation
(Advanced Outbound NAT (AON))
- Then add a rule for your outgoing server/ip, in the Translation
section you will find your x.y.18.20 ip address.
r@
The 2 first instructions went just fine.
The third one, seems to be not working for me.
I tried adding an outbound rule on the LAN interface (since it should be
listening to the inside of my network ?)
I've added the internal ip 192.168.150.9/32 as source, and used the
virtual ip .18.20 as translation.
Also tried adding 192.168.150.9/32 as destination, just to make sure I
didn't mistake myself - but this seems not to work either...
I tried to check using upon http://checkip.dyndns.org to see if my
outgoing connection would be using x.y.18.20, but instead it uses my
default LAN to ADSL backup route (a dynamic ip).
When I disable my default LAN to ADSL route; no comms are possible no
more to the internet.
I have a "SERVERS" rule to make them by default go over to WAN2 (first
IP of that range by default : .18.18)
Default LAN to ADSL route is setup for all leftovers that any other rule
isn't taking care of.
I would like a "SECOND SERVER" rule, to make them by default go over to
WAN2 (second IP of that range : .18.20)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
Commercial support available - https://portal.pfsense.org