• VoWiFi slow failover when using GW Groups

    2
    0 Votes
    2 Posts
    224 Views
    J
    @Proton retro bowl said in VoWiFi slow failover when using GW Groups: I have theese GW groups: [image: 1751568295930-e947b6a3-6853-4534-a448-05e780e72965-image.png] I have a statis route for Mullvad GW to exit through starlink: [image: 1751568352001-ebd2ec98-90a0-4646-9af4-8ddfd609bb32-image.png] On both Mullvad GW i have: [image: 1751568423315-8f24a410-ce6b-430f-acb9-ce97a7ff84b0-image.png] The same for DOME GW. Default Gateway is group : [image: 1751568497527-adb3cbe1-1276-48a2-a07b-e29b797d6610-image.png] and the othe rgroup lookes like this: [image: 1751568531048-5cfa03be-dd61-4bb0-b562-c4fc9dc6c5b9-image.png] , I have also set: [image: 1751568573300-ea0c1c09-dd93-4722-9479-dc0f019f06ea-image.png] And i have my floating rules like this: [image: 1751568631542-a86219e7-b85f-4fb0-a8df-374beaeb0f04-image.png] Including QOS settings. The idea is that when the boat is near land the DOME GW is avtive and is top priority. VoWifi also exit there if possible. So - when we only have Starlink - i force all VoWiFi traffic through WG GWs to always have VoWiFi work even then starlink has exit node abroad (get norwegian ip = allowed ViWiFi). So to my question: When both Dome and starlink is online, i can call using VoWiFi, no issues. But when Dome failes, it takes several minutes (5-6) before the mobile again can call. or get a call. Why is this? I know we are using UDP trffic and STATES here and that a cell phone can have a delay before he checks and reestablishes VoWiFi again, but is there something i can do to make the transition to WG GWs through starlink faster? How can i kill the STATES faster? I have also tried sloppy states and state timeout set to 25, but with same result. Suggestions? THX! You can try implementing a script that automatically flushes states when it detects a Gateway change, as this will significantly reduce the switching delay. The problem you are experiencing is that VoWiFi UDP connections still hold the old state, so the device takes time to check and reset. When the state is refreshed immediately, VoWiFi will reconnect faster and avoid the current 5-6 minute wait. Additionally, you can also consider reducing the state timeout value further or enabling the flush states on gateway down feature if your system supports it.
  • Tailscale Mesh with a Twist

    2
    0 Votes
    2 Posts
    259 Views
    M
    To clarify what does work: What works is that from either site, a client device with an IP of 10.40.x.x is able to traverse the tailscale tunel to the other site by using the 10.65.x.x addresses. However, no device in this 10.40.x.x subnet can get to a 10.40.x.x IP at the other end. I realise that I am NATing the outbound connections rather than directly routing them due to the limitations of pfsense, so I am thinking I need to translate the 10.40.x.x subnet on the way out of the site, but nothing I have tried seems to work so far.
  • splitting a subnet, moving from LAN to WAN

    10
    0 Votes
    10 Posts
    474 Views
    V
    @sgw said in splitting a subnet, moving from LAN to WAN: When I try to ping an IP that has not been used before and in the LAN-part (10.96.25.128/25) from "upstream"/"outside", it gets logged on the pfsense as blocked by the firewall (which is OK in terms of fw-rules). So the pfsense seems to take over traffic pointed to these IPs. Could I modify NAT-rules maybe? Is that related to Outbound NAT? Could I somehow exclude It seems that the lower IP range ist routed to pfSense WAN address. If so, you can do nothing. You cannot use the same IP outside pfSense, because pfSense was not able to route the traffic to the VM, since the subnet is defined on the LAN. You only option would be to use an IP of the upper /25 on the VM and forward it on pfSense. But note that doing this also requires an outbound NAT rule (masquerading) for the forwarded traffic.
  • sticky connections ignored

    9
    0 Votes
    9 Posts
    400 Views
    N
    @pwood999 Indeed. I also run dual fiber links (on different physical fibers, with different building entry points) for resilience, not speed. Plain failover is enough for me too. But issues are issues and should nevertheless be fixed.
  • Intermittent Failover to Backup WAN – Unable to Reach Firewall GUI/SSH

    1
    0 Votes
    1 Posts
    117 Views
    No one has replied
  • Load Balancing with Multiple ISP

    1
    0 Votes
    1 Posts
    165 Views
    No one has replied
  • Routing problem?

    1
    0 Votes
    1 Posts
    176 Views
    No one has replied
  • New PPPoE module (if_pppoe) causes high cpu usage and cause lagging

    9
    0 Votes
    9 Posts
    778 Views
    w0wW
    @cust You don't need to wait anything. You can apply this patch via system patches package, just use commit id 62b1bc8b4b2606d3b20a48a853ef373ff1d71e26
  • Ubiquiti Wave Pro Routing

    1
    0 Votes
    1 Posts
    189 Views
    No one has replied
  • Policy based routing via two IPSEC gateways.

    2
    0 Votes
    2 Posts
    243 Views
    D
    Resolved by implementing BGP peering over IPSEC.
  • Routing instead of NAT between sites

    6
    0 Votes
    6 Posts
    457 Views
    I
    Thanks again for the video. It solved my problem. If anyone bumps into this thread in the future, the static route showed in a screenshot above here was correct, however here's what I did wrong: On site2 I had set "IPv4 Upstream gateway" in the interface config to the gateway on site1. This makes pfsense NAT the traffic instead of routing it. Here's a timestamped link to the video where this is explained.
  • Multiple IPs for Monitor IP Under Gateways

    8
    0 Votes
    8 Posts
    859 Views
    M
    I really wish I could do the same here. I get some false positive failovers because the single IP monitor becomes offline, but the gateway is working fine... Gateway 1 monitor 8.8.8.8 Gateway 1 monitor 1.1.1.1 Gateway 2 monitor 8.8.4.4 Gateway 2 monitor 1.0.0.1 Gateway 3 Then prioritize them and route following this order.
  • Tailscale Connections

    2
    0 Votes
    2 Posts
    296 Views
    W
    OK, I think I just figured it out!! I didn't have the subnet enabled. Not sure how it happened, but it now seems to be working. I can open the printer's web page!! Now I can revisit things.
  • 0 Votes
    47 Posts
    4k Views
    stephenw10S
    Do you see errors on the parent interface? You can try the dtrace commands shown in this thread and see if you're hitting some error other than 55 (no buffers).
  • Truenas VLAN jellyfin return route wrong

    2
    0 Votes
    2 Posts
    272 Views
    4
    @4o4rh i am struggling to get policy based routing working on truenas scale. either i get the situation where non-media vlans can access the jellyfin server on the media vlan (but then the truenas/smb vlan is not accessible, or the truenas/smb vlan is accessible by not the jellyfin vlan (other than from a device on the vlan). It both cases the non-accessible vlan is appearing on the wrong pfsense interface. so, it seems truenas is returning via the default route rather than the desired return route
  • PPPoE module (if_pppoe) in DSL environment

    1
    0 Votes
    1 Posts
    165 Views
    No one has replied
  • WAN2 on Netgate SG-2100 not working

    2
    0 Votes
    2 Posts
    231 Views
    I
    Ignore this For anyone maybe suffering with similar issues, I went through the guide again and realised I'd forgotten to update the Port VID under Interfaces > Switch > Ports as well as updating the VLAN Tag under Interfaces > Switch > VLANs Once that was done it got an IP and I could use it as a WAN port.
  • Tailscale to pfsense forwarding to another site connecte

    1
    0 Votes
    1 Posts
    146 Views
    No one has replied
  • Secondary WAN DHCP installing default route

    1
    0 Votes
    1 Posts
    161 Views
    No one has replied
  • Route traffic out over VPN

    1
    0 Votes
    1 Posts
    194 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.