Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Interface gets pinged even when cable not connected

    Scheduled Pinned Locked Moved General pfSense Questions
    21 Posts 11 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD Offline
      Derelict LAYER 8 Netgate
      last edited by

      pfSense does not take interface IP addresses down when ethernet carrier is lost like, say, a Cisco does.

      In fact, the interface addresses actually route to loopback interfaces internally.

      What you're seeing is completely normal.  You can ping a local interface address even though the interface has nothing plugged into it.  Your initial description had everyone thinking you were saying you could still ping 192.168.1.1 from 192.168.1.10 even though it was unplugged.

      Amazing how a diagram clears things up immediately.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • S Offline
        Supermule Banned
        last edited by

        HAHAHAHAHAHAHAHAH

        You gotta be kidding :D

        Your pinging the interface INSIDE the Soekris box. You need to ping 192.168.1.10 to see the result of you pulling the cable. Try to disable the interface in pfsense and your ping will be gone ;)

        :D

        1 Reply Last reply Reply Quote 0
        • DerelictD Offline
          Derelict LAYER 8 Netgate
          last edited by

          I don't think it's that funny.  A Cisco takes the local interface IP address down if it loses carrier, at least by default.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • M Offline
            maverick_slo
            last edited by

            No this II funny :)

            1 Reply Last reply Reply Quote 0
            • D Offline
              doktornotor Banned
              last edited by

              1 Reply Last reply Reply Quote 0
              • DerelictD Offline
                Derelict LAYER 8 Netgate
                last edited by

                Difference of opinion on how a router should actually behave I guess.  Neither behavior is wrong.  But I would bet the pfSense guys would welcome more Cisco-like behavior if FreeBSD were to implement it.  Optional, of course.

                Anyway, OP, the reason these guys are bagging on you is easily answered by looking at your diagram.  See the ping source, then the ping response, then the connection break FURTHER down the path?

                There is really no reason for the router not to respond.  The connection break is the next hop.

                (Cisco routers do respond in this situation BTW, with an ICMP Destination Unreachable)

                
                R2-2620#ping 192.168.1.1
                
                Type escape sequence to abort.
                Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
                U.U.U
                
                

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • H Offline
                  Harvy66
                  last edited by

                  Interface IPs going down can mess with services on the firewall box making is more likely for a service to not rebind to the IP when the interface comes back up. Many services get around this by restarting when a new interface comes up. Many sandbox setups will drop privileges to bind interfaces once the software initializes, meaning the software can't bind to a new IP.

                  There's many fewer corner cases if you just let the IP stay on the interface even when it's not plugged in. Use a heart beat if you need to check uplink status.

                  1 Reply Last reply Reply Quote 0
                  • M Offline
                    mer
                    last edited by

                    Maybe if one does ifconfig down on the interface after you pull the cable, you get the desired response.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD Offline
                      Derelict LAYER 8 Netgate
                      last edited by

                      Interface IPs going down can mess with services on the firewall box making is more likely for a service to not rebind to the IP when the interface comes back up.

                      I can certainly see that being a problem.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ Offline
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        since when would these IPs go down even in a cisco switch.. Normally your ip would be on loopback or svi, not actually tied to any physical interface..  Can not remember putting an IP on the actual interface before in cisco..  If you were running services on a cisco switch like dhcp or routing even that would be over a SVI, not actually tied to a physical interface being up or down..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • P Offline
                          phil.davis
                          last edited by

                          I have had switch/router devices before that would stop responding to ping on an interface if the interface was physically down - from memory it was Cabletron/Enterasys gear. Once you knew the behaviour, it meant you knew when the cable had fallen out at a remote place.

                          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.