Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Remote ping to multi GW IP's

    Scheduled Pinned Locked Moved Routing and Multi WAN
    7 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      brebix
      last edited by

      I am trying to figure out how to be able to ping each gateway interface remotely.  I have tried a bunch of stuff but the best i could do is ping only 1 and not the other not both.
      Figure someone has to know this one I am sure I am missing something dumb.

      Thanks in advanced
      Ray
      ![ping_multi GW.jpg](/public/imported_attachments/1/ping_multi GW.jpg)
      ![ping_multi GW.jpg_thumb](/public/imported_attachments/1/ping_multi GW.jpg_thumb)

      1 Reply Last reply Reply Quote 0
      • P Offline
        phil.davis
        last edited by

        I guess the text on your diagram has a typo - it says the piing to gateway 2 both works and fails. I assume ping to gateway 1 works, ping to gateway 2 fails.
        Do both gateways have a real public IP right to the pfSense?
        Do both gateways have firewall rules that allow ping (ICMP) coming in from the internet (at least from the remote place you ping from)?

        As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
        If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

        1 Reply Last reply Reply Quote 0
        • B Offline
          brebix
          last edited by

          @phil.davis:

          I guess the text on your diagram has a typo - it says the piing to gateway 2 both works and fails. I assume ping to gateway 1 works, ping to gateway 2 fails.
          Do both gateways have a real public IP right to the pfSense?
          Do both gateways have firewall rules that allow ping (ICMP) coming in from the internet (at least from the remote place you ping from)?

          Yep Typo sorry yes you are correct.

          I have public IP's one static assigned public IP one public dynamically assigned IP.

          I have set allow ICMP any source and dest IF adddress for each interface.

          Its odd because I can see it hit my firewall and its blocked then i set up the rules and its no longer showing on firewall log as blocked or passed (checked Log Packets rule).

          It seems i can only ping whatever one i set up as my default GW at this time.

          1 Reply Last reply Reply Quote 0
          • B Offline
            brebix
            last edited by

            I simply cant ping each wan interface IP independently with the rules set up
            pass  wan1  | ICMP any | source any | dest wan1 address
            pass  wan2  | ICMP any | source any | dest wan2 address

            I stop seeing on my firewall log the blocked ICMP on either interface but I can still only ping one of them.
            It seems whatever one I set as my default gateway works

            1 Reply Last reply Reply Quote 0
            • G Offline
              ggzengel
              last edited by

              I think this will be the solution:
              https://doc.pfsense.org/index.php/Interface_Groups

              Using Interface Groups for WANs will not put "reply-to" on the resulting rules, because it can't do so for rules in groups. Due to this, traffic entering via an alternate WAN (non-default route) will exit back via the default route.

              To keep the proper return routing, you must place rules for inbound services behind the firewall on their respective WAN tabs, and not on the group tab.

              1 Reply Last reply Reply Quote 0
              • B Offline
                brebix
                last edited by

                @ggzengel:

                I think this will be the solution:
                https://doc.pfsense.org/index.php/Interface_Groups

                Using Interface Groups for WANs will not put "reply-to" on the resulting rules, because it can't do so for rules in groups. Due to this, traffic entering via an alternate WAN (non-default route) will exit back via the default route.

                To keep the proper return routing, you must place rules for inbound services behind the firewall on their respective WAN tabs, and not on the group tab.

                I am not using interface groups I set duplicate rules on both interfaces..
                and I have individual rules for ICMP on each WAN interface…

                I have them in a gateway group for load balancing on the LAN interface.

                1 Reply Last reply Reply Quote 0
                • G Offline
                  ggzengel
                  last edited by

                  I hope you didn't disable reply-to on System: Advanced: Firewall and NAT.

                  Look at your outgoing NAT rules: The source address shouldn't include the WAN addresses.
                  I use an alias with all internal used (or all private networks) as source addresses.

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.