Project

General

Profile

Actions

Bug #14403

closed

Syslog Over OpenVPN Routed Out Default GW On Reboot

Added by James Blanton over 1 year ago. Updated over 1 year ago.

Status:
Not a Bug
Priority:
Normal
Assignee:
-
Category:
System Logs
Target version:
-
Start date:
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:
Default
Affected Version:
2.7.0
Affected Architecture:
7100

Description

When using syslog over a site-to-site VPN, syslog will begin to route all syslog messages out of the default gateway (typically a WAN interface). This creates a state which will continue to be used even after OpenVPN tunnels have been re-established. The ONLY way to restore functionality is for that state to become inactive. Restarting the service, stopping and starting the service, removing and re-adding the entry, or changing the bound interface has no effect UNLESS the changes take long enough for the state to become inactive.

pfSense 23.01
7100-1U
FRR BGP for dynamic routing over OpenVPN site-to-site tunnels
It occurs whether the system has all the latest recommended system patches or without any patches.

Actions #1

Updated by Jim Pingle over 1 year ago

  • Status changed from New to Not a Bug

This is a configuration issue -- if traffic is taking a path you don't want when the VPN is down, you need to add rules to block it (e.g. reject it outbound on WAN via floating rules).

Actions #2

Updated by James Blanton over 1 year ago

The problem is it taking an undesired path originally. It shouldn't continue to take that path if a better route is available. In this instance, the routes in the routing table are correct, but the traffic continues to go out of the default gateway indefinitely until the state is killed.

This was not a problem in any of the prior versions and only happened after the upgrade to 23.01.

Actions

Also available in: Atom PDF