Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Gateway change on Default allow LAN to any rule breaks unbound dns and icmp #3666

Closed
zer00k opened this issue Aug 24, 2019 · 2 comments
Closed
Labels
support Community support

Comments

@zer00k
Copy link

zer00k commented Aug 24, 2019

Important notices
Before you add a new report, we ask you kindly to acknowledge the following:

[X] I have read the contributing guide lines at https://github.com/opnsense/core/blob/master/CONTRIBUTING.md

[X] I have searched the existing issues and I'm convinced that mine is new.

Describe the bug
Changing the "Gateway" setting on the LAN firewall policy "Default allow LAN to any rule" breaks unbound dns, the firewall stops responding to icmp etc. on the LAN interface.

I may of missed a setting, but I can't see why it breaks things.
I have a WAN GW from my ISP, and multiple OpenVPN GW's, and want to ensure LAN traffic always uses the ISP GW, and then I will use more specific rules and outbound NAT to force individual clients over their respective OpenVPN links

To Reproduce
Steps to reproduce the behavior:

  1. Go to 'LAN firewall policy'
  2. Click on 'Default allow LAN to any rule'
  3. Scroll down to 'Gateway'
  4. Change gateway to WAN_DHCP
  5. Unbound DNS stops responding, ping of FW LAN address fails

Expected behavior
LAN traffic should use WAN_DHCP gateway.
Services and icmp should remain unaffected

Environment

OPNsense 19.7.2-amd64
Vmware ESXi 6.7 latest
Network - vmxnet3 adapters

@AdSchellevis
Copy link
Member

@AdSchellevis AdSchellevis added the support Community support label Aug 24, 2019
@mimugmail
Copy link
Member

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
support Community support
Development

No branches or pull requests

4 participants