meta data for this page
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| sw:opnsense:issues [2020/09/11 11:19] – niziak | sw:opnsense:issues [2025/08/20 12:12] (current) – niziak | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== |
| + | |||
| + | ===== WAN bandwidth limited ===== | ||
| + | |||
| + | 4 port '' | ||
| + | |||
| + | * last post in: [[https:// | ||
| + | * [[https:// | ||
| + | * [[]] | ||
| + | https:// | ||
| + | |||
| + | https:// | ||
| + | |||
| + | [[https:// | ||
| Line 78: | Line 91: | ||
| Firewall --> Settings --> Advanced: Tick **Disable force gateway** (Outgoing packets from this firewall on an interface which has a gateway will normally use the specified gateway for that interface. When this option is set the route will be selected by the system routing table instead.) | Firewall --> Settings --> Advanced: Tick **Disable force gateway** (Outgoing packets from this firewall on an interface which has a gateway will normally use the specified gateway for that interface. When this option is set the route will be selected by the system routing table instead.) | ||
| + | |||
| + | ====== cannot reach another VLAN from VPN ====== | ||
| + | |||
| + | Check for asymetric routing. Firewall cannot track one way packet flow so packets are blocke by default rule. | ||
| + | Solution is to add pass rule without connection tracking enabled (tracking '' | ||