Pfsense as a NAT Gateway

Use the instructions below to work with Private Node groups through Pfsense

Prerequisites

To be able to use Pfsense as NAT Gateway for Cluster on VKS system, you need:

  • A Pfsense server (VM) is initialized on the vMarketPlace system according to the instructions below with the following configuration:

Item

Configuration

Flavor

2x4

Volume

80 GB

VPC

10.3.0.0/16

Network Interface 1

10.3.0.3


Initialize Pfsense

Step 1: Visit https://marketplace.console.vngcloud.vn/

Step 2: At the main screen, search for Pfsense , at Pfsense service , select Launch .

Step 3: Now, you need to configure Pfsense. Specifically, you can select the desired Volume, IOPS, Network, Security Group . You need to choose the same VPC and Subnet as the VPC and Subnet you choose to use for your Cluster. In addition, you also need to select an existing Server Group or select Dedicated SOFT ANTI AFFINITY group so we can automatically create a new server group.

Step 4: Proceed to pay like normal resources on VNG Cloud.


Configure parameters for Pfsense

Step 1: After initializing Pfsense from vMarketPlace according to the instructions above, you can access the vServer interface here to check whether the server running Pfsense has been initialized. Next, open the Any rule on the Security Group for the Pfsense server you just created. Opening the Any rule on the Security Group will allow all traffic to the Pfsense server.

Step 2: After the server running Pfsense is successfully initialized . To access the Pfsense GUI, you need to use the IP address of the External Interface to log in with the default Username and password admin/pfsense.

  • To get this IP information, go to the Network Interface section of Pfsense to view the information

Step 3 : Open the rule on the firewall

  • Proceed to Add rule

  • You can open the rule as below to access the GUI using External Interface .

Attention:

  • You should limit the IP Range allowed to connect to the Pfsense GUI to limit users allowed to access the Pfsense GUI.

  • Select Save

  • Then select Apply changes

Step 4 : Proceed with General Setup , please do as below

  • Configure WAN Interface

  • Change password in GUI

  • Proceed to reload

  • General Setup completed

Step 5: Configure LAN Interface

  • Go to Interfaces -> Assignments to add a LAN Interface

  • Click Add

  • Then click Save

  • Go to Interfaces -> Assignments to enable LAN Interface

  • You make the configuration as below

  • Configure IP for LAN

  • Then proceed to Add a new gateway: enter Gateway for LAN Interface

  • To get this IP information, go to the Network Interface section of the Pfsense server to view the information:

  • Proceed to Save again

Step 6 : Review configuration information

Step 7 : Open the Internet outbound rule for the LAN interface

  • At source, select the IP range that is allowed to go out to the Internet

Step 8: Configure NAT so that vServers can go out to the Internet

  • Go to Firewall -> NAT

  • Select NAT mode then proceed to configure NAT

  • Click Add to add the rule

  • Select source , destination NAT


Initialize Route Table

After Pfsense is successfully initialized and configured, you need to create a Route table to connect to different networks. Specifically, follow these steps to create a Route table:

Step 1: Visit https://hcm-3.console.vngcloud.vn/vserver/network/route-table

Step 2: In the navigation menu bar, select Network Tab/ Route table.

Step 3: Select Create Route table.

Step 4: Enter a descriptive name for the Route table. Route table names can include letters (az, AZ, 0-9, '_', '-'). The input data length is between 5 and 50. It must not include leading or trailing spaces.

Step 5: Select VPC for your Route table. If you do not have a VPC, you need to create a new VPC according to the instructions on the VPC Page . The VPC used to set up the Route table must be the VPC selected for your Pfsense and Cluster.

Step 6 : Select Create to create a new Route table.

Step 8: In the add new Route section , enter the following information:

  • For Destination, enter Destination CIDR as 0.0.0.0/0

  • For Target, enter Target CIDR as the Pfsense Network Interface 2 IP address.

For example:


Checking connection

Proceed to ping google.com or 8.8.8.8 to check

  • Before Enable NAT the server could not access the internet

  • After configuring NAT, ping 8.8.8.8 to check

Last updated