Quote from: Patrick M. Hausen on January 28, 2026, 08:46:58 PMI guessed as much, already. Perfectly understood. I run DCs myself.
You simply need to manually
- disable NAT - Firewall: NAT: Outbound: "Disable outbound NAT rule generation"
- create a firewall rule on WAN permitting access to your servers
The default setup of a new installation is tailored to a home/SMB setup for Internet access with NAT. And everything you do not explicitly allow is forbidden by default. So without an allow rule on WAN no access.
HTH,
Patrick
I've tried many configurations now (NAT disabled, explicit WAN and LAN rules in place), but I still can't resolve the issue.
One important detail about my rack setup:
I have two separate uplinks from the datacenter
Uplink #1 goes directly to the switch
Uplink #2 goes directly to the OPNsense WAN
OPNsense LAN is also connected to the same switch
So effectively, the switch has two uplinks:
one directly to the datacenter/core
one through OPNsense
This means the servers behind the switch may have two possible paths to the internet:
directly via the switch uplink
or via OPNsense
Could this dual-uplink / asymmetric routing design be the root cause of the state violation and 100% packet loss I'm seeing, even with correct firewall rules and NAT disabled?
If so, am I correct that the proper design should be:
a single uplink only into OPNsense (WAN), and
the switch should be connected only to the OPNsense LAN, with no direct uplink of its own?
I want to make sure all traffic is forced symmetrically through the firewall.
Thanks in advance.
"