# /sbin/ping -S '172.21.101.254' -c '3' '10.1.1.109'PING 10.1.1.109 (10.1.1.109) from 172.21.101.254: 56 data bytes64 bytes from 10.1.1.109: icmp_seq=0 ttl=127 time=30.058 ms64 bytes from 10.1.1.109: icmp_seq=1 ttl=127 time=29.573 ms64 bytes from 10.1.1.109: icmp_seq=2 ttl=127 time=29.568 ms--- 10.1.1.109 ping statistics ---3 packets transmitted, 3 packets received, 0.0% packet lossround-trip min/avg/max/stddev = 29.568/29.733/30.058/0.230 ms
root@OPNsense:~ # ssh -b 172.21.101.254 192.168.162.95The authenticity of host '192.168.162.95 (192.168.162.95)' can't be established.ECDSA key fingerprint is SHA256:Yv8S/Po2DfZu66ws8YU8s9h/woGgBsjUrOD47qJ1kuM.No matching host key fingerprint found in DNS.Are you sure you want to continue connecting (yes/no/[fingerprint])? ^Croot@OPNsense:~ #
Interface Proto Address Ports Address Ports IP Ports IPsec TCP * * LAN net 5555 192.168.162.95 22 (SSH)
Interface Capture outputenc0enc0 14:46:53.675703 (authentic,confidential): SPI 0xcaa31154: IP 10.1.1.109.49873 > 172.21.101.254.5555: tcp 0LANxn1 14:46:53.675738 IP 10.1.1.109.49873 > 192.168.162.95.22: tcp 0
enc0enc0 14:55:02.325863 (authentic,confidential): SPI 0xcaa31154: IP 10.1.1.109.49949 > 172.21.101.254.5555: tcp 0enc0enc0 14:55:05.325635 (authentic,confidential): SPI 0xcaa31154: IP 10.1.1.109.49949 > 172.21.101.254.5555: tcp 0LANxn1 14:55:02.325899 IP 172.21.101.254.12429 > 192.168.162.95.22: tcp 0LANxn1 14:55:02.326378 IP 192.168.162.95.22 > 172.21.101.254.12429: tcp 0LANxn1 14:55:03.355919 IP 192.168.162.95.22 > 172.21.101.254.12429: tcp 0LANxn1 14:55:05.272145 ARP, Request who-has 172.21.101.254 tell 172.21.101.1, length 42LANxn1 14:55:05.272154 ARP, Reply 172.21.101.254 is-at 06:b9:6a:bb:c8:e4, length 28LANxn1 14:55:05.325658 IP 172.21.101.254.12429 > 192.168.162.95.22: tcp 0LANxn1 14:55:05.326165 IP 192.168.162.95.22 > 172.21.101.254.12429: tcp 0LANxn1 14:55:07.355896 IP 192.168.162.95.22 > 172.21.101.254.12429: tcp 0
reboot and retry, maybe? :-)