Project

General

Profile

Actions

Bug #1951

closed

Auto generated reply-to rules not working

Added by Larry Titus over 12 years ago. Updated over 8 years ago.

Status:
Rejected
Priority:
Normal
Assignee:
-
Category:
Multi-WAN
Target version:
-
Start date:
10/12/2011
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:
Affected Version:
2.0
Affected Architecture:
i386

Description

In Multi-WAN setups, traffic seems to always leave the default gateway no matter what interface it entered on. For testing I added rules to allow ICMP and SSH via first via a Floating Rule and later via an Interface Group. Traffic would not leave the interface it entered in on unless I added a rule on the each of my WAN type interfaces and clicked "This will disable auto generated reply-to for this rule" under Advanced Options. This seems backwards of the expected behavior.


Files

All_Comcast_Interface_Rules.png (281 KB) All_Comcast_Interface_Rules.png Larry Titus, 10/13/2011 11:34 AM
ICMP_FLT_Rule.png (336 KB) ICMP_FLT_Rule.png Larry Titus, 10/13/2011 11:34 AM
All_FLT_Rules.png (297 KB) All_FLT_Rules.png Larry Titus, 10/13/2011 11:34 AM
ICMP_Int_Grp_Rule.png (336 KB) ICMP_Int_Grp_Rule.png Larry Titus, 10/13/2011 11:34 AM
All_Int_Grp_WANs_Rules.png (312 KB) All_Int_Grp_WANs_Rules.png Larry Titus, 10/13/2011 11:34 AM
Comcast_ICMP_Interface_Rule.png (329 KB) Comcast_ICMP_Interface_Rule.png Larry Titus, 10/13/2011 11:34 AM
Actions #1

Updated by Ermal Luçi over 12 years ago

Without showing what you configured on the floating rules i cannot give you a real answer.

My first guess is that you just not created the right rule and the packets already matched another rule!

Actions #2

Updated by Larry Titus over 12 years ago

6 Screenshots attached. The Floating and Interface Group rules were only enabled one at a time. They are both disabled now because when enabled, they break the normal Interface rules. My examples only show ICMP but it affected all TCP connections as well. The rules I have on my Comcast interface, I had to duplicate to my UUNet and FiOS interfaces as well before they would work. If I uncheck the "disable reply-to" option on those interface rules, then all packets regardless of the incoming interface, leave on the default gateway and get dropped by the ISP's seeing packets on their network that do not belong to them. When I check the box to disable reply-to, then traffic leaves on the same interface it entered. This only works for the Interface rules. When checking "disable reply-to" on the FLT or Int Grp rules, it still sends all packets out the default gateway.

Actions #3

Updated by Chris Buechler over 12 years ago

  • Status changed from New to Rejected

no specific bug here, need to post things like this to the list or forum first as it's more likely a config issue as reply-to definitely works.

Actions #4

Updated by Larry Titus over 12 years ago

For the record, this must have been "upgrade rot". After doing a clean 2.0-Release install and restoring the exact same config, everything is now working as expected. This firewall has been updated a good 20 times throughout the 2.0 BETA/RC cycle. If this ticket re-opens when I leave this comment, please close it out again.

Actions #5

Updated by Chris Buechler over 8 years ago

  • Target version deleted (2.0.1)
Actions

Also available in: Atom PDF