Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Traffic on Tier2 Gateway w/out Failover Event

    Scheduled Pinned Locked Moved Routing and Multi WAN
    5 Posts 2 Posters 249 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      pfnewb2016
      last edited by

      Netgate 6100 running v25.07.1.
      The problem was also happening on prior version.

      Gateway Group in Failover mode, Packet Loss or Latency.
      Starlink is Tier 2, primary ISP is Tier 1.
      I am seeing significant traffic, 300k steady - 80Mbs burst, over Starlink without any failover events logged. I'm hitting our Starlink 50GB cap in 4-7 days.
      There are no firewall rules that specify the Starlink GW. All fw rules either don't specify a gateway or specify the Tier 1 gateway.
      Inbound WAN rules only allow traffic on the Tier1 interface so it should go out the same path it came in on.
      Traffic monitor shows the gateway IP and the WAN2 interface as the source/destination.

      1. How can I track down the source of the traffic?
      2. What could be causing traffic in the absence of a failover event?
      3. How can I prevent this?

      Thank you for your help.

      TLS_pfsense_Gateways_251013.png

      TLS_pfsense_GatewayGroups_251013.png

      TLS_pfsense_GatewayGroup_Detail_251013.png TLS_pfsense_WAN2Traffic_251006.png

      TLS_pfsense_WAN2Traffic_251007.png

      tls_pfsense_SummaryDash.png

      1 Reply Last reply Reply Quote 0
      • P Offline
        pfnewb2016
        last edited by

        Also, there are 3 IPSEC tunnels on the WAN interface.

        tls_pfsense_IPSEC_251013.png

        1 Reply Last reply Reply Quote 0
        • P Offline
          pfnewb2016
          last edited by

          Tech support provided the help needed to get this resolved.

          1. Set Kill State on Gateway Recovery. This setting is under Advanced-->Miscellaneous, not Gateway or Gateway Groups so it's easy to miss, as I did.

          2. Use Diagnostics-->States to view what traffic was using the T2 Gateway (Starlink).

          3. Set the Gateway Group as the specified Gateway on the firewall rules that were incorrectly using the T2 Gateway (Starlink).

          4. I believe setting the Gateway Group in the rule, vs relying on the Default Route = Gateway Group, was necessary because of this issue specific to Starlink:
            Classless static routes received on DHCP WAN can override chosen default gateway

          A 1 Reply Last reply Reply Quote 0
          • A Offline
            andrekyler @pfnewb2016
            last edited by

            @pfnewb2016 said in Traffic on Tier2 Gateway w/out Failover Event:

            Tech support provided the help needed to get this resolved.

            1. Set Kill State on Gateway Recovery fnaf
              This setting is under Advanced-->Miscellaneous, not Gateway or Gateway Groups so it's easy to miss, as I did.

            2. Use Diagnostics-->States to view what traffic was using the T2 Gateway (Starlink).

            3. Set the Gateway Group as the specified Gateway on the firewall rules that were incorrectly using the T2 Gateway (Starlink).

            4. I believe setting the Gateway Group in the rule, vs relying on the Default Route = Gateway Group, was necessary because of this issue specific to Starlink:
              Classless static routes received on DHCP WAN can override chosen default gateway

            Despite configuring a default route, your network traffic was incorrectly utilizing the T2 Gateway (Starlink), necessitating the explicit setting of the Gateway Group on firewall rules rather than relying on the default route. What is the specific issue with Starlink's behavior that makes it necessary to explicitly define the Gateway Group in firewall rules, rather than relying on the default route, to prevent incorrect traffic routing?

            P 1 Reply Last reply Reply Quote 1
            • P Offline
              pfnewb2016 @andrekyler
              last edited by

              @andrekyler
              Check the Redmine link in #4.

              pfSense is overriding the Gateway Group as the DG with the classless static route that Starlink is including in their DHCP offer. Either Starlink needs to stop sending the static route, or pfSense needs to handle it differently. It feels more like an incompatibility than a bug, but way above my pay grade and I doubt Starlink is going to make a change.

              Per Jim Pingle 3 yrs ago:

              "It's unusual to get classless static routes from DHCP in most cases so the situation has likely never come up before.

              From the notes in the source:

              # RFC 3442: If the DHCP server returns both a Classless Static
              # Routes option and a Router option, the DHCP client MUST ignore
              # the Router option.
              

              So there should maybe be more logic there as well to treat the default as a gateway replacing the router option (e.g. ignore the route and set it as the value of $new_routers)"

              A few related discussions show it's affecting other L3 devices:
              https://www.reddit.com/r/Starlink/comments/msfy4k/dhcp_option_121_no_more_need_to_add_a_static/

              https://community.ui.com/questions/Gateway-target-0-0-0-0-and-not-routing-packets/8576234c-5d61-4ef7-81e0-27ac5b07d7e1

              https://documentation.meraki.com/SASE_and_SD-WAN/MX/Design_and_Configure/Deployment_Guides/Meraki_and_Starlink_Deployment_Guide

              1 Reply Last reply Reply Quote 1
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.