Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Default gateway change is effective only after reboot #653

Open
kamild1996 opened this issue Mar 22, 2020 · 1 comment
Open

Default gateway change is effective only after reboot #653

kamild1996 opened this issue Mar 22, 2020 · 1 comment

Comments

@kamild1996
Copy link

Description of issue/question

When you change the default gateway of a network interface in OMV's network settings, the new gateway is being added but it's not set as a default gateway, rendering the change ineffective. Rebooting the device removes the old gateway, which finally makes the change effective.
Result of the sudo ip route command after changing the gateway (in this case, 10.0.0.128 is the old gateway and 10.0.0.1 is the new one):

default via 10.0.0.128 dev eth0 proto static
default via 10.0.0.1 dev eth0 proto static
10.0.0.0/24 dev eth0 proto kernel scope link src 10.0.0.20
172.16.24.0/24 dev ztrfyhcrsm proto kernel scope link src 172.16.24.1
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown

Steps to reproduce issue

  1. Login to your OMV control panel
  2. Go to "System > Network", to the "Interfaces" tab.
  3. Change the gateway and save changes.
  4. Verify with sudo ip route that the new gateway was added, but not set to default.

Versions report

5.3.0-1 (Usul)

@votdev
Copy link
Member

votdev commented Mar 22, 2020

OMV uses systemd to configure the network. If systemd can't handle this, then we can not do anything here. OMV is not able to detect which config option has been changed, so no individual action can be done to workaround this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants