Yes, I only show the rules on the floating and interface group called Internet.
The floating rule show a rule that say ICPM from any, any port, to this firewall accept.
Why you say that my floating rule is for deny all my other addresses?
If when you put THIS FIREWALL on the destination option it apply for ALL THE INTERFACES.
If you see the rules (some ones that are not in use) it show also for each interfaces the same rule.
I tested all the variants.
I use the same rules in a firewall that have 3 WANs with static IP address and works fine.
I use the same rules in a firewall that have 4 WANs with 2 static IP address and 2 DHCP address, and if I put as default gateway one of the DHCP WAN, i can ping to 3 of 4 WANs, if I put as default Gateway one of the 2 static WAN i just can ping to the 2 static WANs.
The order to apply the rules if Im not wrong is from UP to Down (on the screen, pfSense do not show a rule number order) and first apply the floating rules, then the interface groups and then the interfaces.
I tested too to delete the rules on the floating, and the interface groups, delete the interface group, and apply the rules in each WAN interfaces, same thing, I only can ping and attend request on a interface that is the default gateway (when it has a DHCP ip address) i doing it in a virtual LAB and is the same thing).
What other information is needed to perform an analysis?
John Poz if you want i can give you access to the virtual lab to put hand on.
Regards and thanks for you invaluable time John
[image: interface_group.png]
[image: interface_group.png_thumb]
[image: interface_inet-telecentro.png]
[image: interface_inet-telecentro.png_thumb]
[image: interface_inet-fibertel.png]
[image: interface_inet-fibertel.png_thumb]
[image: interface_inet-free.png]
[image: interface_inet-free.png_thumb]
[image: interface_inet-vpnht.png]
[image: interface_inet-vpnht.png_thumb]