1
15.7 Legacy Series / Howto bind outgoing traffic from opnsense (localhost) to specific WAN interface?
« on: January 24, 2016, 02:27:10 pm »
Hi,
I have a multi-WAN setup.
I've used outbound NAT rules and firewall rules to route outgoing traffic from subnets to the OpenVPN interfaces. This is working well.
However, I wish to setup dyndns to cloudns.net using the WAN IP. Cloudns.net is not one of the listed providers for setting up dyndns in opnsense, so I was planning to add it myself as a cron job or similar. Hence relying on that the correct WAN interface is used for outgoing traffic from the opnsense host itself. But localhost is using one of the VPN interfaces for outgoing traffic.
I have tried setting up similar firewall rules to make 127.0.0.1 use the WAN interface for outgoing traffic. I have tried putting this rule on all different interfaces, but outgoing traffic from localhost always go through one of the VPN interfaces.
How can I control which WAN interface opnsense (localhost) use for outgoing traffic?
Regards,
Peter
I have a multi-WAN setup.
- WAN with DHCP from my ISP
- OpenVPN client
- OpenVPN client 2
I've used outbound NAT rules and firewall rules to route outgoing traffic from subnets to the OpenVPN interfaces. This is working well.
However, I wish to setup dyndns to cloudns.net using the WAN IP. Cloudns.net is not one of the listed providers for setting up dyndns in opnsense, so I was planning to add it myself as a cron job or similar. Hence relying on that the correct WAN interface is used for outgoing traffic from the opnsense host itself. But localhost is using one of the VPN interfaces for outgoing traffic.
I have tried setting up similar firewall rules to make 127.0.0.1 use the WAN interface for outgoing traffic. I have tried putting this rule on all different interfaces, but outgoing traffic from localhost always go through one of the VPN interfaces.
How can I control which WAN interface opnsense (localhost) use for outgoing traffic?
Regards,
Peter