Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    25.07 RC - no default gateway being set if default route is set to a gateway group and the Tier 1 member interface is down

    Scheduled Pinned Locked Moved Plus 25.07 Develoment Snapshots (Retired)
    66 Posts 7 Posters 1.5k Views 7 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S Online
      stephenw10 Netgate Administrator
      last edited by

      Mmm, a good solution here would be some anycast ping targets that aren't DNS servers. But using DNS servers there is really convenient! ๐Ÿ˜‰

      dennypageD 1 Reply Last reply Reply Quote 1
      • dennypageD Offline
        dennypage
        last edited by

        Effectively, @luckman212โ€™s request is for a static route that only applies to IGMP echos originating from the firewall itself.

        M 1 Reply Last reply Reply Quote 0
        • M Offline
          marcosm Netgate @dennypage
          last edited by

          @dennypage FWIW that doesn't happen currently even with pf. The route-to rule is based on the interface's source address with any destination that's not in the interface's subnet. Still, a rule can be created that applies to the correct traffic.

          Given the feedback, it sounds like the issue isn't that a route should not exist, but rather some route is needed to allow pf to force the traffic. That's effectively the workaround @stephenw10 showed. Any potential undesired behavior from that kind of solution needs to be considered.

          1 Reply Last reply Reply Quote 2
          • dennypageD Offline
            dennypage @stephenw10
            last edited by

            @stephenw10 said in 25.07 RC - no default gateway being set if default route is set to a gateway group and the Tier 1 member interface is down:

            Mmm, a good solution here would be some anycast ping targets that aren't DNS servers. But using DNS servers there is really convenient! ๐Ÿ˜‰

            Convenient yes, but from time to time, Google and others get annoyed with everyone using their DNS servers as monitor targets and put temporary blocks in place. I generally recommend people to use regional routers in their ISP instead.

            luckman212L 1 Reply Last reply Reply Quote 1
            • luckman212L Online
              luckman212 LAYER 8 @dennypage
              last edited by

              @dennypage Exactly! I had written a script called hopfinder that I mentioned farther up, which already does this successfully & automatically for the FIOS connection, where traceroute works properly. On the LTE network, no such luck so I've resorted to querying the RDAP database (which had a nice parseable JSON output) for /32 hosts in T-mobile's network, and then iterating over a handful of them to find a few with the lowest latency. "it works" but the script takes about 45 seconds from start to finish, so not something to run every day, but once a week seems about right.

              I'm planning to publish the updated script soon, trying to decide if it's worth making into a full package with a GUI.

              S 1 Reply Last reply Reply Quote 1
              • S Offline
                SteveITS Rebel Alliance @luckman212
                last edited by

                Would a workaround for the fees be to block from LAN to 8.8.8.8 with a policy routing rule? Or would the static route override that? (haven't looked, just brainstorming)

                FWIW since it was mentioned above, pfBlocker can block DoT, which it has tucked under "DNSBL SafeSearch." Though as I've mentioned elsewhere I know that at least the Dish DVR video on demand "app" (though not the DVR software) is hardcoded to use Google DoT, I think it was.

                Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                Upvote ๐Ÿ‘ helpful posts!

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.