Thanks Scott for the Carp and OpenVPN answer. I have just one more.

I have a /29 that I run pfsense in and a /27 subnet of dmz addresses that is 
routed to me. I setup incoming load balancing with one of these /27 addresses. 
It didn't work. I wasn't sure if creating the virtual server with the dmz 
address also created a virtual ip, so I tried both. Neither one worked. I did 
set a firewall rule to allow the traffic. I looked at the output of 
/tmp/rules.debug and it didn't look like there was anything but an anchor.

I'm using the 2-20 testing snapshot

here's the relevant rules.debug output

# Load balancing anchor - slbd updates
rdr-anchor "slb"
rdr on fxp2 proto tcp from any to any port 21 -> 127.0.0.1 port 8021
rdr on fxp1 proto tcp from any to any port 21 -> 127.0.0.1 port 8022
rdr on xl0 proto tcp from any to any port 21 -> 127.0.0.1 port 8023

The other question has to do with reflection redirects. If I read correctly 
these should let me access my public dmz addresses from the lan interface? If 
this is correct then these don't work. But they are the least of my concerns as 
I've traditionally used split dns. Here's an example reflection rule from 
rules.debug.

rdr on fxp0 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 192.168.xx.xx 
port 80
# Reflection redirects
rdr on fxp2 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 127.0.0.1 port 
19003
rdr on fxp1 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 127.0.0.1 port 
19004
rdr on xl0 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 127.0.0.1 port 
19005

I do have to say I've put two pfsense nodes into production using failover carp 
and it's much nicer then the netscreen we were using. The thing that killed the 
netscreen was it's inability to delete 1:1 mappings until the server using that 
ip was down for hours. Then the netscreen would notice it was down and let you 
delete the mapping. With pfsense it's been so much easier.

Thanks,
Daniel

Reply via email to