F5F Stay Refreshed Power Users Networks The OPNSense device initiates a routing cycle repeatedly

The OPNSense device initiates a routing cycle repeatedly

The OPNSense device initiates a routing cycle repeatedly

Pages (2): 1 2 Next
S
snoozebaseball
Junior Member
41
10-31-2024, 09:31 PM
#1
I have a configuration with a TP-Link router as my primary gateway and an OPNsense device in my lab. I'm still getting familiar with OPNsense and prefer to avoid disrupting the whole setup. In the TP-Link router, a static route points to the OPNsense server, which functions smoothly. The problem arises because OPNsense generates routes that create a loop. For example, a device on a VLAN behind the OPNsense router keeps triggering a route for a specific IP address, causing traffic to circle instead of flowing through the correct VLAN interface. Can I prevent OPNsense from establishing this particular route?
S
snoozebaseball
10-31-2024, 09:31 PM #1

I have a configuration with a TP-Link router as my primary gateway and an OPNsense device in my lab. I'm still getting familiar with OPNsense and prefer to avoid disrupting the whole setup. In the TP-Link router, a static route points to the OPNsense server, which functions smoothly. The problem arises because OPNsense generates routes that create a loop. For example, a device on a VLAN behind the OPNsense router keeps triggering a route for a specific IP address, causing traffic to circle instead of flowing through the correct VLAN interface. Can I prevent OPNsense from establishing this particular route?

U
unicorn520
Member
208
11-01-2024, 08:18 AM
#2
We should clarify your environment here. It appears you’re managing everything remotely in your home lab, right? Is Opnsense also virtualized? Which hypervisor are you using? I usually run PFSENSE virtually on my lab but use a dual-port Intel NIC through Proxmox to simulate real networking. The WAN connects to PFSENSE via a static IP from your main router, while the LAN exits through another port. After connecting the LAN cable to a managed switch, everything functions normally. The Proxmox host is plugged into that switch, and because Proxmox supports VLANs, you can assign VM tags accordingly. This setup works entirely in a virtual space, though I find the cost of a 30-dollar NIC to be excessive compared to the inconvenience it causes. If you provide an actual physical PCIe NIC to Opnsense, you could route the static WAN IP directly into the WAN port and connect the LAN cable straight to the host’s Ethernet port or hypervisor. In that case, the hypervisor would run entirely under Opnsense at the physical layer. Opnsense must be operational for your host to function, but you can still connect a PC or laptop directly to the host and manage it manually if needed. I manage my whole network this way. PFSENSE serves as my edge router. If PFSENSE fails, the entire network collapses, including the Proxmox host. It’s not the best setup, but it works if you’re comfortable with it. Starting small in your lab is a solid approach.
U
unicorn520
11-01-2024, 08:18 AM #2

We should clarify your environment here. It appears you’re managing everything remotely in your home lab, right? Is Opnsense also virtualized? Which hypervisor are you using? I usually run PFSENSE virtually on my lab but use a dual-port Intel NIC through Proxmox to simulate real networking. The WAN connects to PFSENSE via a static IP from your main router, while the LAN exits through another port. After connecting the LAN cable to a managed switch, everything functions normally. The Proxmox host is plugged into that switch, and because Proxmox supports VLANs, you can assign VM tags accordingly. This setup works entirely in a virtual space, though I find the cost of a 30-dollar NIC to be excessive compared to the inconvenience it causes. If you provide an actual physical PCIe NIC to Opnsense, you could route the static WAN IP directly into the WAN port and connect the LAN cable straight to the host’s Ethernet port or hypervisor. In that case, the hypervisor would run entirely under Opnsense at the physical layer. Opnsense must be operational for your host to function, but you can still connect a PC or laptop directly to the host and manage it manually if needed. I manage my whole network this way. PFSENSE serves as my edge router. If PFSENSE fails, the entire network collapses, including the Proxmox host. It’s not the best setup, but it works if you’re comfortable with it. Starting small in your lab is a solid approach.

A
AgustinM_
Junior Member
14
11-21-2024, 06:20 AM
#3
I see, this seems to be a more specific networking challenge. I understand that switching everything online is complicating things, but I'm also curious about how VLANs function for security cameras or similar setups down the line. From a hardware standpoint, I'm running an Intel i350-T4 with all ports routed through a VM on Unraid using OPNSense virtualization. Only one port is active since it doesn't affect my VLAN setup, which connects the rest of my gear to the managed switch. When certain devices attempt DNS access via the Pi-Hole, they go through the router in a chain: OPNSense, TPLink, then OPNSense again. This loop continues until the router automatically creates a new route directing traffic from 10.20.110.2/32 through the WAN port to the TPLink router instead of using the standard VLAN path. Pinging the DNS container ends up with a "TTL expired" error, which clears the route and resolves the issue. I’m still puzzled about why this route is being generated repeatedly.
A
AgustinM_
11-21-2024, 06:20 AM #3

I see, this seems to be a more specific networking challenge. I understand that switching everything online is complicating things, but I'm also curious about how VLANs function for security cameras or similar setups down the line. From a hardware standpoint, I'm running an Intel i350-T4 with all ports routed through a VM on Unraid using OPNSense virtualization. Only one port is active since it doesn't affect my VLAN setup, which connects the rest of my gear to the managed switch. When certain devices attempt DNS access via the Pi-Hole, they go through the router in a chain: OPNSense, TPLink, then OPNSense again. This loop continues until the router automatically creates a new route directing traffic from 10.20.110.2/32 through the WAN port to the TPLink router instead of using the standard VLAN path. Pinging the DNS container ends up with a "TTL expired" error, which clears the route and resolves the issue. I’m still puzzled about why this route is being generated repeatedly.

T
Tanhu
Member
212
11-28-2024, 04:52 AM
#4
The connection stops here, unfortunately.
T
Tanhu
11-28-2024, 04:52 AM #4

The connection stops here, unfortunately.

M
mishy07
Senior Member
371
11-28-2024, 05:02 AM
#5
I prefer working directly with hardware since it's simpler to understand what's happening when you interact with physical ports. Many times I've questioned why devices fail because I misconfigured the VLANs on my switches.
M
mishy07
11-28-2024, 05:02 AM #5

I prefer working directly with hardware since it's simpler to understand what's happening when you interact with physical ports. Many times I've questioned why devices fail because I misconfigured the VLANs on my switches.

A
Abdo687
Junior Member
30
11-28-2024, 06:37 AM
#6
Yeah, same. I manage multiple VLANs and run VMs and containers in different ones inside Proxmox. From a setup point of view, it’s mostly just physical networking. I’m not mixing WAN and LAN traffic over the same cables or tweaking hypervisor routing like that. My mind keeps getting confused. If you connect a physical NIC to OPNSENSE, it should be straightforward… except when devices on the WAN side need to reach the LAN side. My brain also hates router logic. I’ve never done this before, so I’m unsure what steps to take. Do you need to open ports for WAN to LAN? Are LAN devices being NAT’d? I think so. Probably.
A
Abdo687
11-28-2024, 06:37 AM #6

Yeah, same. I manage multiple VLANs and run VMs and containers in different ones inside Proxmox. From a setup point of view, it’s mostly just physical networking. I’m not mixing WAN and LAN traffic over the same cables or tweaking hypervisor routing like that. My mind keeps getting confused. If you connect a physical NIC to OPNSENSE, it should be straightforward… except when devices on the WAN side need to reach the LAN side. My brain also hates router logic. I’ve never done this before, so I’m unsure what steps to take. Do you need to open ports for WAN to LAN? Are LAN devices being NAT’d? I think so. Probably.

N
Nero12321
Posting Freak
858
11-28-2024, 12:17 PM
#7
I'm focusing on the part I'm attempting and still struggling with. Using baremetal doesn't seem to solve the problem, as the VLAN interface in my diagram would just be another physical port instead of being routed through VLANs. Traffic flows and stays isolated until OPNSense updates its routing table. The issue lies in how OPNSense decides the best path for packets going from OPNSense WAN to OPNSense VLAN. It thinks the optimal route is to send traffic back out via the main router, which routes it back to OPNSense WAN, rather than through the VLAN interface directly. The routing table has an entry for [10.20.110.0/24 -> VLAN interface], but a new entry appears automatically for [10.20.110.2/32 -> WAN Interface, Gateway 192.168.1.1], creating a loop. I don't understand why OPNSense chooses that specific route when it has direct access to the interface already used by the network.
N
Nero12321
11-28-2024, 12:17 PM #7

I'm focusing on the part I'm attempting and still struggling with. Using baremetal doesn't seem to solve the problem, as the VLAN interface in my diagram would just be another physical port instead of being routed through VLANs. Traffic flows and stays isolated until OPNSense updates its routing table. The issue lies in how OPNSense decides the best path for packets going from OPNSense WAN to OPNSense VLAN. It thinks the optimal route is to send traffic back out via the main router, which routes it back to OPNSense WAN, rather than through the VLAN interface directly. The routing table has an entry for [10.20.110.0/24 -> VLAN interface], but a new entry appears automatically for [10.20.110.2/32 -> WAN Interface, Gateway 192.168.1.1], creating a loop. I don't understand why OPNSense chooses that specific route when it has direct access to the interface already used by the network.

W
Wiicarbon
Member
234
11-30-2024, 11:19 PM
#8
Additionally, this configuration seems off and isn't suitable for my primary routing setup. It bothers me because the issues I'm encountering aren't what I anticipated in such an unusual routing arrangement.
W
Wiicarbon
11-30-2024, 11:19 PM #8

Additionally, this configuration seems off and isn't suitable for my primary routing setup. It bothers me because the issues I'm encountering aren't what I anticipated in such an unusual routing arrangement.

L
Linda
Member
149
12-01-2024, 07:15 AM
#9
Sure, I get it. You’re not wrong about the need for physical presence, but figuring out how routers handle multiple subnets can be tricky. It seems like the problems you’re facing might be beyond my usual scope.
L
Linda
12-01-2024, 07:15 AM #9

Sure, I get it. You’re not wrong about the need for physical presence, but figuring out how routers handle multiple subnets can be tricky. It seems like the problems you’re facing might be beyond my usual scope.

M
Magic_Wolf_
Senior Member
530
12-01-2024, 12:51 PM
#10
Let me know if you'd like me to rephrase it further.
M
Magic_Wolf_
12-01-2024, 12:51 PM #10

Let me know if you'd like me to rephrase it further.

Pages (2): 1 2 Next