1
23.7 Legacy Series / Re: My experience with opnsense
« on: October 21, 2023, 12:58:04 pm »It seems like most of your issues are simple misunderstandings, which is no shame when you're new to OPNsense. People here (mostly) don't bite, asking for help before throwing in the towel might have been a good idea.
#1 If you can provide steps how to reproduce this, open an issue on GitHub. The developers appreciate substantiated bug reports.
Looking at this script, https://github.com/opnsense/plugins/blob/master/net/wireguard/src/opnsense/scripts/Wireguard/wg-service-control.php I believe this issue has been fixed. Probably not upstreamed into a release yet.
The issue was, it was trying to add a ipv6 route with `route -4 add ...` which fails.
#2 A gateway group never changes the system's default route. The switch happens in the "route-to" option of the firewall rule. You can check this in Firewall: Diagnostics: Statistics: rules. If you want failover for services running on OPNsense itself, you can enable default gateway switching in System: Settings: General.
Got it! From the docs, I got the idea this was for cases when there were multiple gateways on a WAN and there was need for an option to switch between them ? Thanks for the correction
#3 #4 Not exactly sure how you would prefer this to work. Can you elaborate?
#3: It should failover much faster than it does. It takes forever to mark a pppoe connection as down(10+ seconds)
#4: This is probably just different way of doing things. I prefer recursive routes but opnsense and the NOS I am on now, vyos implement this differently where a separate service monitors a WAN connection and marks it active/failed. In mikrotik, I was doing this with recursive routes and it was much faster.
#5 A single /64 delegated via DHCPv6 PD won't support more than one LAN. That's how IPv6 works, not a limitation of OPNsense. If your ISP doesn't give you more than a /64, you'd have to use IPv6 NAT for additional LANs (ough).
If my ISP assigns a single dynamic /64 via slaac, I can use NDP and I can use this prefix from various networks in LAN. If they assign a dynamic /64 via dhcpv6, I can't use it on more than 1 lan interface. This was the problem here. It'll be nice if it can use ndp in both situations.
#6 Needs more details. What did you create, firewall rules or port forward rules? What's the goal? An inbound rule on an interface behind CGNAT doesn't really make sense to me. Your ISP most likely won't allow inbound connections anyway.
The goal here was, I open a port for wireguard. It should communicate to the other peer over this port. But it was using some random port and the entries in conntrack were just really weird. (please see the image above)
The inbound rule was on the WAN interface group. 1 WAN has static public IP and another is behind CGNAT.
This is more complicated to explain and we can honestly just skip past it because I moved away from this setup and I won't be able to replicate it and help in fixing it.
Regards
Ishan Jain