19:14:27.705347 IP 192.168.3.11 > hostname.int.example.com: ICMP echo request, id 29, seq 1, length 6419:14:27.705358 IP hostname.int.example.com > 192.168.3.11: ICMP echo reply, id 29, seq 1, length 6419:14:27.706141 IP 192.168.2.1 > hostname.int.example.com: ICMP redirect 192.168.3.11 to host 192.168.3.11, length 92
oLAN configuration: 10.10.0.1/16 [snip]One thing to note: the container runs in a VLAN with ID 20 on a separate Interface on SN 10.10.2.0/24 (GW 10.10.2.1)
You realise that 10.10.2.0/24 is a subnet within 10.10.0.0/16, right? Is this "separate interface" on OPNsense or something else?
OK, so long as your VLAN 10 interface is configured with 10.10.0.1/24 and not /16 (as your original post suggested).
I'd probably get a shell on OPNsense and run tcpdump on the VLAN 20 interface to see if the ping response is coming back, and look towards Proxmox if not....
21:03:22.053809 IP (tos 0x0, ttl 64, id 52340, offset 0, flags [DF], proto ICMP (1), length 84) 192.168.3.11 > 192.168.3.101: ICMP echo request, id 38, seq 4, length 6421:03:22.053925 IP (tos 0x0, ttl 63, id 53210, offset 0, flags [none], proto ICMP (1), length 84) 192.168.3.101 > 192.168.3.11: ICMP echo reply, id 38, seq 4, length 6421:03:22.054586 IP (tos 0xc0, ttl 64, id 16302, offset 0, flags [none], proto ICMP (1), length 112) 192.168.2.1 > 192.168.3.101: ICMP redirect 192.168.3.11 to host 192.168.3.11, length 92 IP (tos 0x0, ttl 62, id 53210, offset 0, flags [none], proto ICMP (1), length 84) 192.168.3.101 > 192.168.3.11: ICMP echo reply, id 38, seq 4, length 64
root@OPNsense:~ # ping 192.168.3.11PING 192.168.3.11 (192.168.3.11): 56 data bytes64 bytes from 192.168.3.11: icmp_seq=0 ttl=64 time=0.263 ms64 bytes from 192.168.3.11: icmp_seq=1 ttl=64 time=0.176 ms64 bytes from 192.168.3.11: icmp_seq=2 ttl=64 time=0.214 ms64 bytes from 192.168.3.11: icmp_seq=3 ttl=64 time=0.180 ms
Code: [Select]21:03:22.053809 IP (tos 0x0, ttl 64, id 52340, offset 0, flags [DF], proto ICMP (1), length 84) 192.168.3.11 > 192.168.3.101: ICMP echo request, id 38, seq 4, length 6421:03:22.053925 IP (tos 0x0, ttl 63, id 53210, offset 0, flags [none], proto ICMP (1), length 84) 192.168.3.101 > 192.168.3.11: ICMP echo reply, id 38, seq 4, length 6421:03:22.054586 IP (tos 0xc0, ttl 64, id 16302, offset 0, flags [none], proto ICMP (1), length 112) 192.168.2.1 > 192.168.3.101: ICMP redirect 192.168.3.11 to host 192.168.3.11, length 92 IP (tos 0x0, ttl 62, id 53210, offset 0, flags [none], proto ICMP (1), length 84) 192.168.3.101 > 192.168.3.11: ICMP echo reply, id 38, seq 4, length 64I should emphasize the subnet mask on the mLAN: 192.168.2.0/23, covering the range 192.168.2.0 - 192.168.3.255.I intended to reserve 192.168.2.0/24 for homelab devices and services exposed to the mLAN, while 192.168.3.0/24 is reserved for all mLAN devices not part of the homelab. (DHCP on the uplink router is configured so only IPs in the 192.168.3.0/24 subnet are assigned).Could the issue be related to the subnet mask on the mLAN?
root@OPNsense:~ # route get 192.168.3.11 route to: 192.168.3.11destination: 192.168.2.0 mask: 255.255.254.0 fib: 0 interface: ix1 flags: <UP,DONE,PINNED> recvpipe sendpipe ssthresh rtt,msec mtu weight expire 0 0 0 0 1500 1 0
0010_MANAGEMENT (vlan0.10) -> v4: 10.10.0.1/240015_OPENVPN (vlan0.15) -> v4: 10.10.1.1/300020_GAMESERVERS (vlan0.20) -> v4: 10.10.2.1/240040_CLOUD (vlan0.40) -> v4: 10.10.4.1/24LAN (ix0) ->WAN (ix1) -> v4: 192.168.2.2/23WG_JUMP01 (wg0) -> v4: 10.0.0.1/24
Do you have any firewall rules which specifically use the (o)WAN gateway? Even then, I don't think it should cause this, as it's the response packets for sessions that should be already tracked ... but I'm running out of ideas :/
13:49:41.518261 dc:a6:32:0c:da:28 (oui Unknown) > 7c:5a:1c:7c:f9:cc (oui Unknown), ethertype IPv4 (0x0800), length 74: (tos 0x48, ttl 64, id 38546, offset 0, flags [DF], proto TCP (6), length 60) 192.168.3.11.53974 > 192.168.3.101.ssh: Flags [S], cksum 0xe6ad (correct), seq 2350197043, win 64240, options [mss 1460,sackOK,TS val 821306743 ecr 0,nop,wscale 7], length 013:49:41.518448 7c:5a:1c:7c:f9:cc (oui Unknown) > 18:82:8c:05:be:20 (oui Unknown), ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 60) 192.168.3.101.ssh > 192.168.3.11.53974: Flags [S.], cksum 0xdc32 (correct), seq 865488568, ack 2350197044, win 65160, options [mss 1460,sackOK,TS val 265254068 ecr 821306743,nop,wscale 7], length 0
192.168.2.2/23
192.168.3.11
10.10.2.101
192.168.3.101