• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Upgrade 2.5.2 to 2.6.0, upgrade success, Limiters not passing

Scheduled Pinned Locked Moved General pfSense Questions
129 Posts 32 Posters 39.3k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    stephenw10 Netgate Administrator @pooperman
    last edited by Feb 16, 2022, 6:08 PM

    @pooperman If you have multiple gateways make sure the default is set as WAN there.
    If it's set as automatic and you have internal gateways that can become the default route which is obviously invalid.
    Most people should not have internal gateways there. You would only have that if you have an internal router with other subnets behind it.

    Steve

    P 1 Reply Last reply Feb 16, 2022, 6:12 PM Reply Quote 0
    • S
      stephenw10 Netgate Administrator @tohil
      last edited by Feb 16, 2022, 6:10 PM

      @tohil Can we see that limiter config from the config file?

      T 1 Reply Last reply Feb 17, 2022, 7:19 AM Reply Quote 0
      • P
        pooperman @stephenw10
        last edited by Feb 16, 2022, 6:12 PM

        @stephenw10
        I have one WAN gateway from my provider, but its not default, its uses for only vpn connection. And second gateway is a VPN one, which is marked as default.
        It works on 2.5.2, its works on 2.6.0, but only after reapply gateway settings by hand. But for reboot it has no internet at all.

        S 1 Reply Last reply Feb 16, 2022, 6:16 PM Reply Quote 0
        • S
          stephenw10 Netgate Administrator @pooperman
          last edited by Feb 16, 2022, 6:16 PM

          @pooperman Hmm, interesting. What is the default route after a reboot before you reapply the gateway? Does the VPN come up correctly?

          Steve

          P 1 Reply Last reply Feb 16, 2022, 6:25 PM Reply Quote 0
          • P
            pooperman @stephenw10
            last edited by Feb 16, 2022, 6:25 PM

            @stephenw10
            How I can see default route?
            VPN come up correctly after reboot. Its receive ip address and marks green on dashboard.
            Another thing I noticed is that after rebooting the default gateway has no globe icon. After reapply gateways settings by hand it appears.
            Also its possible to restart VPN connection instead of reapply gateways settings. After that internet is also has up.

            B 1 Reply Last reply Feb 16, 2022, 6:37 PM Reply Quote 0
            • B
              bingo600 @pooperman
              last edited by Feb 16, 2022, 6:37 PM

              @pooperman

              Diagnostic --> Routes

              7caa9cfe-4854-49c3-8cd4-5447730edc96-image.png

              If you find my answer useful - Please give the post a 👍 - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

              P 1 Reply Last reply Feb 16, 2022, 6:48 PM Reply Quote 0
              • S
                stephenw10 Netgate Administrator
                last edited by Feb 16, 2022, 6:44 PM

                It sounds like it might be trying to apply the default route before gateway is valid for some reason.

                Have you editing the OpenVPN gateway at all? To set a different monitoring IP for example.

                Steve

                1 Reply Last reply Reply Quote 0
                • P
                  pooperman @bingo600
                  last edited by Feb 16, 2022, 6:48 PM

                  @bingo600
                  Interesting. It is no default route at all after reboot.

                  @stephenw10
                  No. I did not edit OpenVPN gateway.

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Feb 16, 2022, 7:21 PM

                    Try editing and saving the OpenVPN gateway without making any changes. It will create the gateway entry in the config which will mean it's present before it connects. Though the route will still be invalid.

                    Steve

                    P 1 Reply Last reply Feb 16, 2022, 7:26 PM Reply Quote 0
                    • P
                      pooperman @stephenw10
                      last edited by Feb 16, 2022, 7:26 PM

                      @stephenw10
                      No. There is no effect. Still have not internet connection after reboot.

                      S 1 Reply Last reply Feb 16, 2022, 9:55 PM Reply Quote 0
                      • T
                        TorqueWrench @SteveITS
                        last edited by Feb 16, 2022, 7:52 PM

                        @steveits said in upgrade 2.5.2 to 2.6.0, upgrade success, no internet conection:

                        That should just remove the rule on WAN to block inbound traffic from bogons.

                        That's also not something I would want anyone else to do. Especially if you were behind a CGNAT...

                        1 Reply Last reply Reply Quote 0
                        • S
                          stephenw10 Netgate Administrator @pooperman
                          last edited by Feb 16, 2022, 9:55 PM

                          @pooperman Then I would check the boot and routing log for errors.

                          You might also check the OpenVPN log since that can often try to set a new default route when it connects.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • T
                            tohil @stephenw10
                            last edited by stephenw10 Feb 17, 2022, 2:03 PM Feb 17, 2022, 7:19 AM

                            @stephenw10

                            	<dnshaper>
                            		<queue>
                            			<name>PublicWLANIn</name>
                            			<number>1</number>
                            			<qlimit></qlimit>
                            			<plr></plr>
                            			<description></description>
                            			<bandwidth>
                            				<item>
                            					<bw>15</bw>
                            					<burst></burst>
                            					<bwscale>Mb</bwscale>
                            					<bwsched>none</bwsched>
                            				</item>
                            			</bandwidth>
                            			<enabled>on</enabled>
                            			<buckets></buckets>
                            			<mask>none</mask>
                            			<maskbits></maskbits>
                            			<maskbitsv6></maskbitsv6>
                            			<delay>0</delay>
                            			<sched>fifo</sched>
                            			<aqm>droptail</aqm>
                            			<ecn></ecn>
                            		</queue>
                            		<queue>
                            			<name>PublicWLANOut</name>
                            			<number>2</number>
                            			<qlimit></qlimit>
                            			<plr></plr>
                            			<description></description>
                            			<bandwidth>
                            				<item>
                            					<bw>30</bw>
                            					<burst></burst>
                            					<bwscale>Mb</bwscale>
                            					<bwsched>none</bwsched>
                            				</item>
                            			</bandwidth>
                            			<enabled>on</enabled>
                            			<buckets></buckets>
                            			<mask>none</mask>
                            			<maskbits></maskbits>
                            			<maskbitsv6></maskbitsv6>
                            			<delay>0</delay>
                            			<sched>fifo</sched>
                            			<aqm>droptail</aqm>
                            			<ecn></ecn>
                            		</queue>
                            		<queue>
                            			<name>CHFreeWiFiIn</name>
                            			<number>3</number>
                            			<qlimit></qlimit>
                            			<plr></plr>
                            			<description></description>
                            			<bandwidth>
                            				<item>
                            					<bw>5</bw>
                            					<burst></burst>
                            					<bwscale>Mb</bwscale>
                            					<bwsched>none</bwsched>
                            				</item>
                            			</bandwidth>
                            			<enabled>on</enabled>
                            			<buckets></buckets>
                            			<mask>none</mask>
                            			<maskbits></maskbits>
                            			<maskbitsv6></maskbitsv6>
                            			<delay>0</delay>
                            			<sched>wf2q+</sched>
                            			<aqm>droptail</aqm>
                            			<ecn></ecn>
                            		</queue>
                            		<queue>
                            			<name>CHFreeWiFiOut</name>
                            			<number>4</number>
                            			<qlimit></qlimit>
                            			<plr></plr>
                            			<description></description>
                            			<bandwidth>
                            				<item>
                            					<bw>15</bw>
                            					<burst></burst>
                            					<bwscale>Mb</bwscale>
                            					<bwsched>none</bwsched>
                            				</item>
                            			</bandwidth>
                            			<enabled>on</enabled>
                            			<buckets></buckets>
                            			<mask>none</mask>
                            			<maskbits></maskbits>
                            			<maskbitsv6></maskbitsv6>
                            			<delay>0</delay>
                            			<sched>wf2q+</sched>
                            			<aqm>droptail</aqm>
                            			<ecn></ecn>
                            		</queue>
                            	</dnshaper>
                            
                            1 Reply Last reply Reply Quote 0
                            • S
                              stephenw10 Netgate Administrator
                              last edited by Feb 17, 2022, 2:05 PM

                              So all traffic using those Limiter pipes is failing or just the FreeWIFI?

                              T 1 Reply Last reply Feb 17, 2022, 4:37 PM Reply Quote 0
                              • A
                                aju_flex @tohil
                                last edited by Feb 17, 2022, 4:01 PM

                                @tohil said in upgrade 2.5.2 to 2.6.0, upgrade success, no internet conection:

                                Same here in my environment. Updated from 2.5.2 to 22.1
                                I have two networks with limiters on rules for these interfaces.

                                all traffic which should pass these rules are not working until I remove the In / Out pipe limiters.

                                I'm having the same issue. The limiters have been working fine with v2.5.2.
                                I even tried a clean install of this v2.6.0 on different devices traffic passes fine but when I activate any rule with In/Out pipes define, traffic stops flowing and there's no internet access.

                                I reinstalled v2.5.2 and everything works fine and limiters working as before.

                                I strongly believe this is a bug with the Limiters feature and it's to some degree similar to this one.

                                B 1 Reply Last reply Feb 23, 2022, 5:52 AM Reply Quote 0
                                • T
                                  tohil @stephenw10
                                  last edited by Feb 17, 2022, 4:37 PM

                                  @stephenw10 all

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    stephenw10 Netgate Administrator
                                    last edited by Feb 17, 2022, 5:14 PM

                                    And no unusual config there, just the default settings?

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      stephenw10 Netgate Administrator
                                      last edited by Feb 17, 2022, 5:47 PM

                                      You see anything in Diag > Limiter Info when it's failing?

                                      Works as expected and shows as expected for me in a simple test case:

                                      Limiters:
                                      00001:  50.000 Mbit/s    0 ms burst 0 
                                      q131073  50 sl. 0 flows (1 buckets) sched 65537 weight 0 lmax 0 pri 0 droptail
                                       sched 65537 type FIFO flags 0x0 0 buckets 1 active
                                      BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
                                        0 ip           0.0.0.0/0             0.0.0.0/0       34     1768  0    0   0
                                      00002:  50.000 Mbit/s    0 ms burst 0 
                                      q131074  50 sl. 0 flows (1 buckets) sched 65538 weight 0 lmax 0 pri 0 droptail
                                       sched 65538 type FIFO flags 0x0 0 buckets 1 active
                                        0 ip           0.0.0.0/0             0.0.0.0/0     71499 107245606 43 64500   0
                                      
                                      
                                      Schedulers:
                                      00001:  50.000 Mbit/s    0 ms burst 0 
                                       sched 1 type WF2Q+ flags 0x0 0 buckets 0 active
                                      00002:  50.000 Mbit/s    0 ms burst 0 
                                       sched 2 type WF2Q+ flags 0x0 0 buckets 0 active
                                      
                                      1 Reply Last reply Reply Quote 0
                                      • T
                                        tohil
                                        last edited by Feb 18, 2022, 8:36 AM

                                        I cannot post, because akismet anti-spam engine...

                                        1 Reply Last reply Reply Quote 0
                                        • B
                                          blikie
                                          last edited by Feb 18, 2022, 11:59 AM

                                          f0bdda34-3c2c-4c4a-8493-79a2dd556f73-image.png

                                          Seems like its doing some unknown packet transfer bug on a idle connection.

                                          1 Reply Last reply Reply Quote 0
                                          30 out of 129
                                          • First post
                                            30/129
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received