• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

ATT Internet AIr

General pfSense Questions
5
290
43.8k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A
    ahole4sure @stephenw10
    last edited by Oct 25, 2024, 9:36 PM

    @stephenw10

    Here are some pics of where I changed back to 192.168.2.0/24

    And the 53 filtered state

    login-to-view login-to-view login-to-view login-to-view login-to-view

    1 Reply Last reply Reply Quote 0
    • A
      ahole4sure @stephenw10
      last edited by Oct 25, 2024, 9:50 PM

      @stephenw10
      Sorry for being a pain in the butt -- but the really bad issue is that I can't seem to find a work around to get things working after the "fail" without literally rebooting the pfsense box!! Makess testing so hard

      1 Reply Last reply Reply Quote 0
      • S
        stephenw10 Netgate Administrator
        last edited by Oct 25, 2024, 9:58 PM

        Ok, two odd things there.

        You fail to get any ping replies from 8.8.8.8 when pinging from WAN. That should work.

        There is DNS traffic from WAN directly but the states show it's still being outbound NAT'd from it's own address which should never happen.

        On the outbound NAT page what rules are shown for the auto generated rules?

        A 1 Reply Last reply Oct 25, 2024, 10:26 PM Reply Quote 0
        • A
          ahole4sure @stephenw10
          last edited by Oct 25, 2024, 10:26 PM

          @stephenw10 login-to-view

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Oct 25, 2024, 10:45 PM

            Hmm, that looks OK.

            You have NAT states showing 192.168.2.2 being NAT'd to itself just on a different port. That normally wouldn't hurt DNS but it also shouldn't happen so it's unclear exactly what it's doing.

            What happens if you reboot with WAN2 disconnected?

            A 1 Reply Last reply Oct 25, 2024, 11:58 PM Reply Quote 0
            • A
              ahole4sure @stephenw10
              last edited by Oct 25, 2024, 11:58 PM

              @stephenw10 So attached are shots where rebooted with WAN2 disconnected

              Still no DNSlogin-to-view login-to-view login-to-view login-to-view login-to-view

              1 Reply Last reply Reply Quote 0
              • S
                stephenw10 Netgate Administrator
                last edited by Oct 26, 2024, 3:34 PM

                Ok. So there is no DNS traffic on WAN there.

                There are clients that are configured to use 8.8.8.8 directly, 192.168.1.79 there, but it appears 8.8.8.8 is statically routed via WAN2 so it's failing.

                Check the routing table in Diag > Routes.

                That would usually be either the gateway monitoring or in the general setup if 8.8.8.8 is configured as a DNS server.
                In your previous screen shots you have 8.8.8.8 used on WAN for both those but it looks like something has changed because it's being forced via WAN2.

                Is 192.168.1.79 a client you're testing from?

                A 4 Replies Last reply Oct 26, 2024, 4:21 PM Reply Quote 0
                • A
                  ahole4sure @stephenw10
                  last edited by Oct 26, 2024, 4:21 PM

                  @stephenw10
                  So I am attaching the Diag > Routing table

                  I am attaching my current setup for my interfaces / gateways
                  And my current setting in the General Setup DNS page

                  Lastly I am attaching what I thought / hoped might work form a Protectli support page for setting up LTE modem on thier devices (in the Advanced Settings of the LAN Rules - forcing it to use the Failover GW

                  But this AM tested and it still failed -- AND had to completely reboot to get internet back up and going once the main WAN2 was plugged back in!
                  login-to-view login-to-view login-to-view login-to-view

                  1 Reply Last reply Reply Quote 0
                  • A
                    ahole4sure @stephenw10
                    last edited by Oct 26, 2024, 4:23 PM

                    @stephenw10
                    login-to-view login-to-view login-to-view

                    1 Reply Last reply Reply Quote 0
                    • A
                      ahole4sure @stephenw10
                      last edited by Oct 26, 2024, 4:25 PM

                      @stephenw10
                      login-to-view login-to-view login-to-view

                      1 Reply Last reply Reply Quote 0
                      • A
                        ahole4sure @stephenw10
                        last edited by Oct 26, 2024, 5:08 PM

                        @stephenw10

                        also btw, I am not sure what .179 is
                        it is not the device I'm testing form - but the network is large with probably more than 50 or 60 devices connected

                        The routing table does not gicve the device a name (like many have) - it just gives a MAC address

                        1 Reply Last reply Reply Quote 0
                        • S
                          stephenw10 Netgate Administrator
                          last edited by Oct 26, 2024, 10:47 PM

                          Ok you have some conflicting settings there. You have DNS servers set with specific gateways and you also have the same DNS servers set as monitoring IPs for the gateways. Both those thing add static routes and must match to work correctly.

                          In your setup you don't need to set gateways on the configured DNS servers because they should work on either WAN and you're using a failover group as the default gateway. Additionally your are resolving directly so the DNS servers configured there are only used as a backup. However the conflicting static routes still breaks DNS for anything trying to use those servers directly. So remove the gateway settings from the DNS servers on the general setup page.

                          If you add a failover group to the pass rules on LAN you bypass rules for local traffic. That includes DNS traffic from LAN side clients to the LAN interface. Otherwise it will be forced out of the WAN and never reach Unbound in pfSense.

                          A 3 Replies Last reply Oct 27, 2024, 2:24 AM Reply Quote 0
                          • A
                            ahole4sure @stephenw10
                            last edited by Oct 27, 2024, 2:24 AM

                            @stephenw10

                            Ok. Thank you for advice
                            I’ll change the DNS settings

                            So do I leave the advanced LAN rule like Protectli recommended or change back to not using. I’m sorry I wasnt clear …

                            1 Reply Last reply Reply Quote 0
                            • A
                              ahole4sure @stephenw10
                              last edited by Oct 27, 2024, 12:08 PM

                              This post is deleted!
                              1 Reply Last reply Reply Quote 0
                              • A
                                ahole4sure @stephenw10
                                last edited by Oct 27, 2024, 12:11 PM

                                @stephenw10
                                Here is the new routing table after removing the DNS static routeslogin-to-view login-to-view

                                1 Reply Last reply Reply Quote 0
                                • S
                                  stephenw10 Netgate Administrator
                                  last edited by Oct 27, 2024, 10:18 PM

                                  Hmm, well I still expect to see the gateway monitoring IPs there, did you remove those too?

                                  Anyway that device at 192.168.1.79 should work fine trying to access 8.8.8.8 directly.

                                  I'm assuming (because it's the default) that your LAN side clients are being passed the LAN interface address to use for DNS?

                                  A 2 Replies Last reply Oct 27, 2024, 11:30 PM Reply Quote 0
                                  • A
                                    ahole4sure @stephenw10
                                    last edited by Oct 27, 2024, 11:30 PM

                                    @stephenw10
                                    I didn't change the monitor IP's on the gateways
                                    ??
                                    Is this what you were referring to?
                                    login-to-view login-to-view

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      ahole4sure @stephenw10
                                      last edited by Oct 27, 2024, 11:32 PM

                                      @stephenw10

                                      I'm not on site until Tuesday - not sure how to safely test while being remote (unless you have ideas on how to "fail" the main internet and not lose connection ??

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        stephenw10 Netgate Administrator
                                        last edited by Oct 28, 2024, 12:35 AM

                                        Hmm, I expect to see static routes for 8.8.4.4 and 1.1.1.1 unless you have checked the box to not add them on the gateway config page.

                                        You may need to resave them to add those routes. Though not doing so should not affect DNS.

                                        If you have the DMZ feature setup on the AT&T router you should be able to access the WAN remotely as long as rules allow it. However I'm not sure I would want to try disconnecting WAN2 without being on site to recover it if required.

                                        A 1 Reply Last reply Oct 28, 2024, 1:10 AM Reply Quote 0
                                        • A
                                          ahole4sure @stephenw10
                                          last edited by ahole4sure Oct 28, 2024, 1:10 AM Oct 28, 2024, 1:10 AM

                                          @stephenw10
                                          Weird -- might even be a part of why I need to reboot after a failed state
                                          BUT. I had to completely reboot the box to get those static routes to show back up (the monitor IPs). Resaving the interface settings , restarting the service , etc - nothing brought back the expected routes until I rebooted the box

                                          login-to-view

                                          1 Reply Last reply Reply Quote 0
                                          38 out of 290
                                          • First post
                                            38/290
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.