Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

reply-to not an issue if interface has no upstream gateway? #2458

Closed
fichtner opened this issue Jun 12, 2018 · 10 comments
Closed

reply-to not an issue if interface has no upstream gateway? #2458

fichtner opened this issue Jun 12, 2018 · 10 comments
Assignees
Labels
cleanup Low impact changes
Milestone

Comments

@fichtner
Copy link
Member

fichtner commented Jun 12, 2018

IPv4 and IPv6 needs this. IPv4 could also use a "far gateway" knob.

https://forum.opnsense.org/index.php?topic=3415.0

@fichtner fichtner added the support Community support label Jun 12, 2018
@fichtner fichtner added this to the 18.7 milestone Jun 12, 2018
@fichtner fichtner self-assigned this Jun 12, 2018
@fichtner
Copy link
Member Author

add add checkbox that allows linking the gateway and default to avoid linking it, discussed with @AdSchellevis

@fichtner
Copy link
Member Author

fichtner commented Jun 25, 2018

Todo: far gw for IPv4, ~~~name fix if description is empty~~~

fichtner added a commit that referenced this issue Jun 25, 2018
fichtner added a commit that referenced this issue Jun 25, 2018
fichtner added a commit that referenced this issue Jun 25, 2018
fichtner added a commit that referenced this issue Jun 25, 2018
@mimugmail
Copy link
Member

@fichtner Today I'm working on the live system regarding this (planned maintainence) and it seems that just removing upstream is not enough.

The most important thing was to tick:

Firewall - Settings - Advanced - Multiwan - Disable Force Gateway.

Only after enabling this I was able to ping an IP behind a second gateway on Interface WAN without routing this packet via default gateway.

No idea how this influences you current patches :/

@fichtner
Copy link
Member Author

can you grep reply-to on /tmp/rules.debug with the setting on and off?

@mimugmail
Copy link
Member

Hang on .. it seems that changing these values do something in the backend what a simple rule change doesn't do.

Can't reproduce anymore when enabling/disabling :(

Also with every constellation no reply-to anywhere in rules.debug ...

@fichtner
Copy link
Member Author

if reply-to is not in the rules in either case I'm positive on the fix. all other side effects are network / routing related

@mimugmail
Copy link
Member

Where your fixes already in 18.1.10?

@fichtner
Copy link
Member Author

no, it's mostly a cosmetic GUI change for 18.7

@mimugmail
Copy link
Member

Cause I'm only testing with stable on this system.
Will replace the machines now .. perhaps I can then preprocude.

@fichtner
Copy link
Member Author

sometimes the network is immune to the reply-to trickery because the upstream router is smart enough to redirect the packets back into the internal network

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cleanup Low impact changes
Development

No branches or pull requests

2 participants