-
-
Notifications
You must be signed in to change notification settings - Fork 110
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
api call bug: #533
Comments
Hi its has been implemented in the branch minor_patch you can follow the issues above |
Hello, the scenario we are using now is as follows: using zerotrust to give the user portal access to the server, the api will be called before accessing the server to create a rule with a validity period; Our implementation is based on v1. At present, more users rely on this scheme. During operation and maintenance, there is no way to manually change the port-forward rule through the GUI |
Hi thanks for the reply You need to fork your own version of pfsense api implement its then install its on a freebsd vps Best regards. |
In which branch can we provide the code to fix this function? Is it v1 or v2 |
Just so I know we're on the same page here, for the filter rule association there are 3 types that behave slightly differently:
For v1, the associated rule feature will not be implemented as v1 is missing the object relation mechanisms necessary and would require a good amount of custom logic to implement properly. However, I am open to allowing v1 to use an unassociated rule for multi-WAN setups if that is sufficient for you. |
Thank you for your reply. We have another situation:when the rule is first set, the default is pass, which is not connected to our server at that time, and wait for a night and the next day it can take effect and connect to our server |
Are you making a POST request to /api/v1/firewall/apply after your rules/port forwards are set? They aren't applied on the backend immediately by default to prevent restarting services multiple times. You can also double check that your rule has been applied afterwards by running |
Discussed in #531
Originally posted by ouyoung33 August 5, 2024
api call bug: When I manually create dnat,Nat will default "filter rule association" to "rule nat" to implement forwarding and connect to my internal machine; But when I create a dnat rule using the api, the "filter rule association" is "pass" but no forwarding is actually implemented, and I can't connect to my internal machine through dnat
The text was updated successfully, but these errors were encountered: