Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Converstion of backup file from 2220 to 4100

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 3 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by stephenw10

      Ok, let me look for it....

      Edit: Found it. For reference your ticket ID was: 1036190288

      Checking it now...

      L 2 Replies Last reply Reply Quote 1
      • L
        LarryM04 @stephenw10
        last edited by

        @stephenw10 There were two tickets open when they initially were trying to help me get the 2220 working 1029506379 and 1036190288. I think the 2nd one may have been for hte conversion

        1 Reply Last reply Reply Quote 0
        • L
          LarryM04 @stephenw10
          last edited by

          @stephenw10 FYI - Just sent a new email to support with an explanation of what's happened from the beginning. It got ticket 1078056888

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Yes, OK the issue here is that old config from the 2220 was from a much older version. 2.4.3p1 from 2018.

            There's no real problem with importing a config that old but since then the WAN failover handling has changed significantly.

            Looking through your config there is one key setting you don't appear to have.

            In Sys > Adv > Misc set 'Skip rules when gateway is down'.

            Without that is both OpenVPN gateways show as down then your policy routing rule on LAN will be created without a gateway set and traffic will just leave via the default route, the WAN.

            Steve

            L 1 Reply Last reply Reply Quote 0
            • L
              LarryM04 @stephenw10
              last edited by

              @stephenw10 So I want this checked on?

              Skip rules when gateway is down
              Do not create rules when gateway is down By default, when a rule has a gateway specified and this gateway is down, the rule is created omitting the gateway. This option overrides that behavior by omitting the entire rule instead.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by stephenw10

                Yes. Otherwise it creates the rule but without any gateway set which passes it out the WAN.

                L 1 Reply Last reply Reply Quote 0
                • L
                  LarryM04 @stephenw10
                  last edited by

                  @stephenw10 Got an email from Kris saying that I deserve Professional level support, sorry I wasn't getting it, and instructions to let them come in and review my 4100. I think your fix will keep my raw ip from leaking out, but I would like to know why I was seeing that flicker which hasn't happened in a while now

                  Thank you very much for your assistance

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    No worries let me know how it goes.

                    The only way you could have been seeing that is if the firewall was opening connections to the WAN directly. And the only way that could happen, with the rules you have, is if the failover gateway group ended up with no on-line gateways.
                    You could have hit that in in 2220 but just never did. That could be for a number of reasons but probably the gateway monitoring changes that have gone in since then have made it more likely.

                    That gateway setting change should prevent it happening again but if for some reason it does not there are a few other things we an add to stop it.

                    Steve

                    L 2 Replies Last reply Reply Quote 1
                    • L
                      LarryM04 @stephenw10
                      last edited by

                      @stephenw10 In my reply I, of course, gave you credit for the find.

                      I don't understand the dithering between addrs... If the connection thru both VPNs were up continuously, why would it flip between them? Is there some condition where the interface is up, but the 4100 thinks there is something wrong?

                      1 Reply Last reply Reply Quote 0
                      • L
                        LarryM04 @stephenw10
                        last edited by

                        This post is deleted!
                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          If the gateway monitoring stops seeing reply pings it will show as down even if the tunnel is up.

                          You can tune how it detects that and what it monitors in the gateway settings:
                          https://docs.netgate.com/pfsense/en/latest/routing/gateway-configure.html#advanced-gateway-settings

                          The WAN which is considered the 'primary' is set by assigning the tiers in the gateway group. The lowest tier gateway is preferred:
                          https://docs.netgate.com/pfsense/en/latest/routing/gateway-groups.html#tier-priority-example

                          Steve

                          L 1 Reply Last reply Reply Quote 1
                          • L
                            LarryM04 @stephenw10
                            last edited by

                            @stephenw10 Ah! So the pings on the primary exceeded the threshold, it flipped over to the secondary, then when the pings worked again on the prim it switches back. Right? The "evil" scenario was the pings stopped on prim, then also stopped on secondary, so went out raw and that was when my real IP showed. Am I catching on?

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yes, exactly. dpinger, the gateway monitor, would have to mark both VPN gateways as down. If that happened the gateway group would have no valid gateways and the rule would be created without a gateway set allowing traffic to leave the WAN directly.
                              Given that both VPNs share the same WAN link it's not that unlikely that congestion on the WAN would cause both to show as down.

                              Steve

                              L 1 Reply Last reply Reply Quote 0
                              • L
                                LarryM04 @stephenw10
                                last edited by

                                @stephenw10 I think its good now. I've only seen one flicker in about a day and a half and it was this:

                                Started Fri Aug 26 07:58:56 PM EDT 2022 IP=194.36.111.30
                                Sat Aug 27 06:34:37 AM EDT 2022 194.36.111.30 -> 
                                Sat Aug 27 06:34:37 AM EDT 2022  -> 194.36.111.30]
                                

                                The printout is "From_IP -> To_IP" so for about a second I had no IP, which I would assume means nothing went out or in.

                                Again, thank you for your help
                                Larry

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Yes, it could have failed to return an IP if both VPN gateways went down. Which is correct.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.