A big thanks to you.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: OPNenthu on March 17, 2026, 04:40:36 PMSo you tried the suggestion there to create manual firewall rules for the NAT rules with 'reply-to' set to the respective gateway, and this worked?No, didn't work. I found options in advanced, values are those you told.
Quote from: OPNenthu on March 17, 2026, 03:31:40 PMAnd also, make sure to update OPNsense to the latest version because there was a fix in 26.1.226.1.4 here
Quote from: OPNenthu on March 17, 2026, 03:22:43 PMYou have set the pool options on the gateway group to either "Default" or "Round Robin with Sticky Address" (they are the same), but Sticky is needed in order to prevent asymmetric routing issues.Was default, change it to RR+sticky
QuoteNow on your LAN interface rules, you have adjusted your IPv4 rule so that the "Gateway" option uses the LB group. Your IPv6 rule still uses the default gateway.IPv6 is working fine, I have a rule which authorized outgoing traffic.
QuoteThe global setting "Firewall->Settings->Advanced->Disable force gateway" is not checked, so this option is enabled globally.The two global settings are those you describe. Concerning the LAN rules, I don't find those advanced mode settings. FYI I'm using the Rules[new]
The global setting "Firewall->Settings->Advanced->Disable reply-to" is not checked, so this is also enabled globally.
In your LAN rules, the advanced mode setting "Disable reply-to" is not checked.
In your LAN rules, the advanced mode setting "Reply-to" is not filled (set to None).
QuoteIs this correct so far? This should take care of the load balancing for connections from the inside->out (LAN hosts to internet).Which is already working
QuoteI think you will need 3 DNAT rules in order to make this work, but the key thing here is that you should not specify gateway groups anywhere. For incoming connections, the path is always through the gateway associated with the public source IP (the respective WAN interface), so load balancing is out of the picture.For IPv6 I already have a working ssh rule.
Also, you should not change any of the reply-to or gateway options in the rules. Leave them default so that OPNsense will automatically track the correct gateway for sending replies.
DNAT rule #1: Forward SSH from ISP#1 (IPv4)
- Interface: WAN1
- Version: IPv4
- Protocol: TCP
- Source: any
- Source port: any
- Destination: WAN1 address
- Destination Port: 22 (ssh)
- Redirect: <ssh_host>
- Redirect port: 22 (ssh)
DNAT rule #2: Forward SSH from ISP#2 (IPv4)
- Interface: WAN2
- Version: IPv4
- Protocol: TCP
- Source: any
- Source port: any
- Destination: WAN2 address
- Destination Port: 22 (ssh)
- Redirect: <ssh_host>
- Redirect port: 22 (ssh)
DNAT rule #3: Forward SSH from ISP#2 (IPv6)
- Interface: WAN2
- Version: IPv6
- Protocol: TCP
- Source: any
- Source port: any
- Destination: WAN2 address
- Destination Port: 22 (ssh)
- Redirect: <ssh_host>
- Redirect port: 22 (ssh)
You can set the firewall rule option to 'Pass' for each of the DNAT rules for simplicity, or you can register or create them manually. Up to you.
Quote from: OPNenthu on March 16, 2026, 04:09:24 AMTry:
Interface: LAN
Direction: IN
Source: LAN net
Destination: !LAN net (or whatever 'internet' means on your network)
Gateway: <YOUR_LB_GROUP>