We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Describe the bug I tried to create port_forward NAT rule with enc0 as interface.
enc0
To Reproduce
wan
{ "apply": true, "descr": "From Postman", "disabled": false, "dst": "192.168.1.1", "dstport": "8080", "interface": "wan", "local-port": "80", "natreflection": "enable", "nordr": false, "nosync": false, "protocol": "tcp", "src": "any", "srcport": "any", "target": "192.168.1.2" }
{ "status": "ok", "code": 200, "return": 0, "message": "Success", "data": { "interface": "wan", "protocol": "tcp", "target": "192.168.1.2", "local-port": "80", "source": { "any": "" }, "destination": { "address": "192.168.1.1", "port": "8080" }, "descr": "From Postman", "natreflection": "enable", "associated-rule-id": "pass", "created": { "time": 1680094211, "username": "[email protected] (API)" }, "updated": { "time": 1680094211, "username": "[email protected] (API)" } } }
{ "apply": true, "descr": "From Postman", "disabled": false, "dst": "192.168.1.1", "dstport": "8080", "interface": "enc0", "local-port": "80", "natreflection": "enable", "nordr": false, "nosync": false, "protocol": "tcp", "src": "any", "srcport": "any", "target": "192.168.1.2" }
API response -> NOK
{ "status": "bad request", "code": 400, "return": 4006, "message": "Unknown port forward interface", "data": [] }
If I modify the port_forward NAT rule from the UI to change wan by IPsec (enc0) -> OK
IPsec (enc0)
https://{{url}}//api/v1/firewall/nat/port_forward
address
/31
{ "status": "ok", "code": 200, "return": 0, "message": "Success", "data": [ { "source": { "any": "" }, "destination": { "address": "192.168.1.1/31", "port": "8080" }, "ipprotocol": "inet", "protocol": "tcp", "target": "192.168.1.2", "local-port": "80", "interface": "enc0", "descr": "From Postman", "associated-rule-id": "pass", "natreflection": "enable", "created": { "time": "1680094211", "username": "[email protected] (API)" }, "updated": { "time": "1680094521", "username": "[email protected] (Local Database)" } } ] }
Expected behavior A port_forward rule with enc0 as interface.
pfSense Version & Package Version:
2.6.0-RELEASE (amd64)
v1.5.3
Affected Endpoints:
/api/v1/firewall/nat/port_forward
In advance, thank you.
The text was updated successfully, but these errors were encountered:
feat: allow if group, ipsec, and openvpn ifs in port forwards #336, #333
dc29317
Successfully merging a pull request may close this issue.
Describe the bug
I tried to create port_forward NAT rule with
enc0
as interface.To Reproduce
wan
as interface -> OKenc0
as interface -> NOKAPI response -> NOK
If I modify the port_forward NAT rule from the UI to change
wan
byIPsec (enc0)
-> OKhttps://{{url}}//api/v1/firewall/nat/port_forward
-> OKBut
address
is also/31
and I don't know why.Expected behavior
A port_forward rule with
enc0
as interface.pfSense Version & Package Version:
2.6.0-RELEASE (amd64)
v1.5.3
Affected Endpoints:
/api/v1/firewall/nat/port_forward
In advance, thank you.
The text was updated successfully, but these errors were encountered: