- Go to  Firewall > Virtual IP and Create a Virtual IP as CARP, with
your x.y.18.20
- Go to Firewall > NAT and set Manual Outbound NAT rule generation
(Advanced Outbound NAT (AON))
- Then add a rule for your outgoing server/ip, in the Translation
section you will find your x.y.18.20 ip address.

r@


The 2 first instructions went just fine.
The third one, seems to be not working for me.

I tried adding an outbound rule on the LAN interface (since it should be listening to the inside of my network ?) I've added the internal ip 192.168.150.9/32 as source, and used the virtual ip .18.20 as translation. Also tried adding 192.168.150.9/32 as destination, just to make sure I didn't mistake myself - but this seems not to work either...

I tried to check using upon http://checkip.dyndns.org to see if my outgoing connection would be using x.y.18.20, but instead it uses my default LAN to ADSL backup route (a dynamic ip). When I disable my default LAN to ADSL route; no comms are possible no more to the internet.

I have a "SERVERS" rule to make them by default go over to WAN2 (first IP of that range by default : .18.18) Default LAN to ADSL route is setup for all leftovers that any other rule isn't taking care of.

I would like a "SECOND SERVER" rule, to make them by default go over to WAN2 (second IP of that range : .18.20)



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Commercial support available - https://portal.pfsense.org

Reply via email to