OPNsense Forum

English Forums => Tutorials and FAQs => Topic started by: cinntech on May 06, 2020, 05:52:43 PM

Title: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: cinntech on May 06, 2020, 05:52:43 PM
Just switched to OPNsense from Untangled. So far I'm preferring OPNsense but I'm having issues with the dual wan balancing; which I wasn't having with Untangled.

While enabled I have clients (home users) that get pauses after most things they do. For example - a Amazon Firestick will show 'no internet' but connected to wifi after every stream or when going back to the main menu. After a few seconds it starts again. It appears to be switching connection on every session.  Similar issues with Google Home, PCs browsing facebook etc... no internet then internet then no internet.

When Gateway groups are setup as Tier 1 / Tier 1 (issue above is noticed).
When Gateway groups are setup as Tier 1 / Tier 2 (issues above go away).
When Gateway groups are setup as Tier 2 / Tier 1 (issues above go away).
I can force gateway on an IP and I have no issues at all (not using gateway groups).
Gateway Group Trigger is [Member Down]
Gateway monitoring is enabled (no check in [disable gateway monitoring]) and all are showing online.

Firewall - Settings - Advanced - [Use sticky connections] is checked.

I'm not sure what I'm missing here...


Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: cinntech on May 06, 2020, 06:38:55 PM
It may be a DNS issue as well...

I have OPNSense as the DNS Server using Unbound DNS - all clients point to OPNSense for DNS.

I have a rule to allow DNS as per (https://docs.opnsense.org/manual/how-tos/multiwan.html):
  IPv4 TCP/UDP   *   *   10.10.10.1   53 (DNS)   *   *   Local Route DNS

In [Services - Unbound DNS - General] Outgoing Network Interfaces is currently set to [All(recommended)].

Would this cause issues if DNS lookups went out 1 WAN while the traffic, for a session, went out another?

Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: cinntech on May 07, 2020, 12:15:15 AM
I tried upping the [Firewall - Settings - Advanced] source tracking timeout to 3000 and same issue... easy to test by browsing facebook - videos start playing when you scroll and if you watch for a second or two then you get the loading screen... Does anyone else get this with load balancing?
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: erickufrin on July 30, 2020, 02:10:14 AM
I too am facing the exact problem you described. Did you determine the proper settings to solve this?
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: erickufrin on July 30, 2020, 02:12:06 AM
When I see the problem occurring the Firewall liveview shows traffic denies incoming to one of the wan interfaces which I presume are asymmetric route traffic... looking for a solution...!
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: devnull.systems on July 31, 2020, 05:27:15 AM
I redirect traffic out multiple VPNs in a similar setup.  I tracked it down to two things.   If I have a FW rule that changes the GW to a GW group and that rule uses anything more than 1 ip odd things happen or don't work.

If I want to use FW rules with /24 or /19s and GW groups. I need to also disable sticky connection under FW>Settings>Advanced>Multi-Wan Uncheck Use sticky connections.
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: tong2x on August 13, 2020, 11:40:29 AM
are you using 20.7?

I have a different issue but sounds similar... mine is captive portal and multiwan gateway group...
it would seem that for some moment, when the OS switches from between the 2 WANs, a routing issue will occur.

Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: vala4i on November 29, 2020, 06:08:30 PM
I observe similar problem. Trying to load balance traffic between two VPN tunnels in a gateway group. As long as both tunnels have the same tier set, Internet connection becomes unstable and hardly usable. This disappears as soon as different tiers are defined for each tunnel in a gateway group (failover without load balancing).
Sticky sessions are enabled.
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: tong2x on November 29, 2020, 11:59:14 PM
https://forum.opnsense.org/index.php?topic=19977.msg93076#msg93076

based on this thread, it would seem that "sticky connection" should be "off" for multiwan to work better.

it should cause problems with ip sensitive site though which you should for now individualy set a policy connection, for now that is.

as said, no promised but will be discused with developers

based on may own, inconclusive test, i dont encounter issues with IP, maybe site nowadays have better session control...
inconclusive as yet but disabling sticky connections help
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: vala4i on November 30, 2020, 05:03:23 AM
I'm OK with just failover (when gateways have different tiers) for now. ISP offers me only 300 mb/s and one Wireguard instance fully covers that, so I can easily route all home traffic through the tunnel without a need for load balancing.

Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: mimugmail on November 30, 2020, 06:08:09 AM
You can also disable shared forwarding (no QoS or Captive
Portal possible) and use sticky with it
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: hoanghien on November 21, 2021, 06:29:40 PM
I got the same problem,any update about this bug?
Title: Re: Gateway Groups - Load Balancing - Sticky connections per IP or sessions?
Post by: dbellizzi on May 19, 2022, 03:03:56 AM
Disabling shared forwarding was the fix for me.  I struggled with this for a long time and with that disabled, everything is working perfectly now with both WANs in the same tier.  Thank you for the help.