> -----Original Message-----
> From: [email protected] [mailto:list-
> [email protected]] On Behalf Of Ugo Bellavance
> Sent: Thursday, 24 November 2011 4:04 AM
> To: [email protected]
> Subject: [pfSense] Replacing CheckPoint Firewall-1 with pfSense
> 
> Hi,
> 
> We're thinking about replacing our CheckPoint Firewall-1 by pfSense.

Ugo,

Been there, done this. Trust me, you will thank yourself for it (no more 
SmartDashboard/SmartCenter and exorbitant support fees!!). We've replaced both 
Checkpoint and Fortinet systems with pfSense with great success.

> We
> are using only those features on Firewall-1 (R65):
> 
> - Security (default deny on everything)
> - NAT (inbound (for internet-facing hosts) and outbound (selective,
> workstations go out through a proxy, other selected hosts are NAT'd
> based on destination host and port(s))
> - We do have some security rules defined in their SmartDefense, but it
> is a nightmare to configure without having many false positives.  I'm
> pretty sure we could go without or simply add Snort to pfSense
> 
> We had a project of roaming users VPN but it's on the ice right now.
> We
> are using SSH tunnels to connect home user's PC to the corporate
> network
> and we will need a solution for the few corporate laptops to connect to
> the corporate network. However, I guess that with all the options
> available in pfSense regarding VPN, I don't think this would be a
> problem.
> 
> Reasons to switch to pfSense:
> 
> - Our Firewall-1 version is not supported anymore so we have to upgrade
> anyway
> - Service contracts are a lot cheaper
> - We would have to pay extra $$ for a redundant setup (CARP pfSense is
> free)
> - It is a platform that I know and I like open-source software
> - It is "officially supported" on vmware (Well, I guess, with a service
> contract)
> - Server load balancing can be used for simple HA setups
> - DHCP server on the firewall (no need for DHCP relay)
> - Other interesting packages
> 
> We are thinking about running a redundant (CARP) setup with one pfSense
> on our VMWare cluster, and one on a physical, separate machine.

I would not recommend a hybrid physical/virtual CARP cluster as CARP is 
entirely network reliant. In a physical CARP cluster best practice is to 
dedicate a network interface on each machine for CARP with a crossover cable 
between them so that even in the event of a switch failure they can still talk 
and elect a master. You would need a dedicated NIC per host, an additional 
physical switch and additional vswitches to achieve the same sort of resiliency 
in a mixed physical/virtual configuration. This can get expensive and adds 
additional points of failure, but without it you run the risk of ending up with 
two masters (i.e. split brain) if the connectivity between your physical and 
virtual networks were to fail. vmWare HA is your friend here, it will remove 
the possibility of a split brain for you if both hosts are running in the 
cluster. HA is not network reliant (as long as you are using a separate storage 
network), it uses a combination of network and shared data store heartb
 eats to monitor hosts and VMs. One host can lose network connectivity, CARP 
will failover the firewalls, the cluster will detect a host isolation response 
and restart the failed VM on another host, all very orderly and controlled with 
less than a couple of seconds of downtime and no physical intervention.

We use two firewalls with CARP in a vSphere cluster, works very nicely.

The things to remember if you go with the two virtual machines are:

        1. Make sure you follow the instructions for CARP and ESX/ESXi from the 
wiki.
        2. Change the host that ESXi pings to determine its network 
availability. If you leave this as the default gateway, the ESX host that is 
hosting the master node will never fail over even in the event of a network 
outage, as it will still be able to ping the VM. This must be something that is 
highly available, we use the address of the stacked switches in our blade 
chassis. See 
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1002478

If you can tolerate a minute or two of downtime in the event of a host failure 
you could even consider a single pfSense VM and just trust vmWare HA to do the 
failover.

> 
> Concerns:
> 
> 1- NAT Reflexion - We don't have a split-DNS setup.  CheckPoint does
> seem to manage NAT Reflexion perfectly.
> 
> 2- Ease to migrate the configuration to pfSense - I would set a pfSense
> VM in parallel and start migrating all the rules manually, but I'm
> scared about missing some or seeing a situation where the Firewall-1
> can
> do it and not pfSense.
> 
> 3- Backups.  Are automated backups (of the config, at least) possible
> even w/o a service contract?
> 
> Can people share their experience with this kind of scenario?
> 
> Don't hesitate if you need more info.
> 
> Thanks,
> 
> Ugo


pfSense works well for the most part, the Snort package has had a few issues in 
the past but once it is working it works well, NAT reflection works fine and 
see the wiki for automated backups 
(http://doc.pfsense.org/index.php/Remote_Config_Backup). The VPN options are 
excellent so I don't think you'll have any issues there. IPv6 is still not 
supported but this was not an issue in our case.

As you will find out, the free support provided on the mailing list is often 
better than the help you get from most CCSP's.

Good luck.

Regards,

Daniel

> 
> _______________________________________________
> List mailing list
> [email protected]
> http://lists.pfsense.org/mailman/listinfo/list
> 
> 
> --
> This message has been scanned for viruses and dangerous content by
> mail.lasseters.com.au, and no infections were found.

_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to