2024-10-04T06:26:24-04:00<6>arp: 192.168.101.112 moved from 24:5e:be:5c:86:6c to 24:5e:be:5c:87:6d on igc02024-10-04T06:26:22-04:00<6>arp: 192.168.101.112 moved from 24:5e:be:5c:86:6d to 24:5e:be:5c:86:6c on igc0
Static leases must lie outside of your dynamic range.
Nothing fundamentally different. What you did for the other devices can lead to the same problem. It's a question of timing. You were lucky until now.Just don't do it, it's not a supported configuration. When I wrote "must" I meant MUST like in RFCs
TY, but there again it's misleading (or confusing) if we are not supposed to use the dynamic-to-static why does the GUI offers a very simple "+" button to actually do just that?
I've hard reset the NAS, now I can PING it (from OPNsense and from Laptop1) on its static address 192.168.101.112 but still can't access its GUIDo I need to open something in the FW rules (I'm scared to change anything in there)
Quote from: MarieSophieSG on October 04, 2024, 03:22:31 pmTY, but there again it's misleading (or confusing) if we are not supposed to use the dynamic-to-static why does the GUI offers a very simple "+" button to actually do just that?To conveniently copy the MAC address to the static reservation form? Then you are supposed to enter an IP address that is of course from the same network but outside the dynamic range you configured in the DHCP settings for that interface.Think of each static reservation as another "range" covering one host. Ranges must not overlap.
If you have the "allow all" rules still in place, there's nothing you could change.Watch what happens when you try to access the UI:Firewall > Log Files > Live View
Interface Time Source Destination Proto Label IGC0_SWITCH1_ETH1_CAT7green 2024-10-04T10:35:51-04:00 RS39:67 192.168.101.112:68 udp allow access to DHCP server IGC0_SWITCH1_ETH1_CAT7green 2024-10-04T10:35:51-04:00 192.168.101.112:68 255.255.255.255:67 udp allow access to DHCP server
Interfaces > Diagnostics > Packet Capture
View captureInterface Timestamp outputIGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:08.012951 IPv4, length 98: 192.168.101.101 > 192.168.101.112: ICMP echo request, id 64245, seq 6775, length 64IGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:08.013069 IPv4, length 98: 192.168.101.112 > 192.168.101.101: ICMP echo reply, id 64245, seq 6775, length 64IGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:09.023283 IPv4, length 98: 192.168.101.101 > 192.168.101.112: ICMP echo request, id 64245, seq 6776, length 64IGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:09.023412 IPv4, length 98: 192.168.101.112 > 192.168.101.101: ICMP echo reply, id 64245, seq 6776, length 64IGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:09.574796 IPv4, length 146: 192.168.101.112.6881 > 31.10.77.218.14994: UDP, length 104IGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:09.718070 IPv4, length 359: 31.10.77.218.14994 > 192.168.101.112.6881: UDP, length 317IGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:10.031770 IPv4, length 98: 192.168.101.101 > 192.168.101.112: ICMP echo request, id 64245, seq 6777, length 64IGC0_SWITCH1_ETH1_CAT7greenigc0 2024-10-0410:51:10.031897 IPv4, length 98: 192.168.101.112 > 192.168.101.101: ICMP echo reply, id 64245, seq 6777, length 64
Interface Time Source Destination Proto Label IGC0_SWITCH1_ETH1_CAT7green 2024-10-04T16:19:08-04:00 192.168.101.101 192.168.101.112 icmp let out anything from firewall host itself IGC0_SWITCH1_ETH1_CAT7green 2024-10-04T16:17:50-04:00 192.168.101.101 192.168.101.112 icmp let out anything from firewall host itself