"reply-to" is a defining feature of "pf".When activated, it will force packets to the default gateway of the interface. This means, it can circumvent issues like asymmetric routing natively.It also means, that clients in the same network as the interface with the gateway will not receive responses since they are all sent to the default gateway.You do not have to globally disable it, creating a firewall rule that matches the exact traffic of the WebGUI, and enabling advanced options in that rule, and setting "reply-to" to "disable" should solve it selectively. Of course, that rule has to match first on the WAN firewall rules.E.g:Source Network: WAN netSource Ports: AnyDestination Network: WAN addressDestination Ports: HTTPS- Advanced Options -Reply-To: Disable
If you're planning on Multi-WAN, you should not disable reply-to globally - rather do it on the specific rules where it's causing an issue - like your WebUI access rule....