I am joining the horde of frustrated people when dealing with the default values for `reply-to` and `Disable force gateway`.
In my case it was a "simple" (I thought) DNAT (Port Forward) to expose the internal email server. Everything worked fine except for all clients in the WAN subnet.
After pulling my hair out for a while, I managed to do it with manual (no reflection) rules for both DNAT and WAN.
Only after that I discovered that the reflection was not the culprit, but the default of `reply-to`.
Since I have a single GW, I disabled the `reply-to` option globally and re-created the fancy, reflection-enabled port forward rule.
Hopefully these defaults get changed at some point. For now, I have yet another thing to do on fresh OPNSense installs. :)
I totally agree with Patrick:
In my case it was a "simple" (I thought) DNAT (Port Forward) to expose the internal email server. Everything worked fine except for all clients in the WAN subnet.
After pulling my hair out for a while, I managed to do it with manual (no reflection) rules for both DNAT and WAN.
Only after that I discovered that the reflection was not the culprit, but the default of `reply-to`.
Since I have a single GW, I disabled the `reply-to` option globally and re-created the fancy, reflection-enabled port forward rule.
Hopefully these defaults get changed at some point. For now, I have yet another thing to do on fresh OPNSense installs. :)
I totally agree with Patrick:
QuoteForce gateway and reply-to are the two "features" I like the least. Not so much the fact that they exist but the fact that they default to active.
A firewall is first and foremost a router with filtering capabilities on top. It runs on a single IP stack with locally connected interfaces and a routing table. And that should be all that is taken into consideration by default when forwarding packets.
Policy routing is of course a nice and frequently necessary feature but there should be no policies active on a newly installed system, IMHO.
"