On 2011-11-23 23:43, Daniel Davis wrote:


We are thinking about running a redundant (CARP) setup with one pfSense
on our VMWare cluster, and one on a physical, separate machine.

I would not recommend a hybrid physical/virtual CARP cluster as CARP is 
entirely network reliant. In a physical CARP cluster best practice is to 
dedicate a network interface on each machine for CARP with a crossover cable 
between them so that even in the event of a switch failure they can still talk 
and elect a master. You would need a dedicated NIC per host, an additional 
physical switch and additional vswitches to achieve the same sort of resiliency 
in a mixed physical/virtual configuration. This can get expensive and adds 
additional points of failure, but without it you run the risk of ending up with 
two masters (i.e. split brain) if the connectivity between your physical and 
virtual networks were to fail. vmWare HA is your friend here, it will remove 
the possibility of a split brain fo
  r you if both hosts are running in the cluster. HA is not network reliant (as 
long as you are using a separate storage network), it uses a combination of 
network and shared data store heartb
  eats to monitor hosts and VMs. One host can lose network connectivity, CARP 
will failover the firewalls, the cluster will detect a host isolation response 
and restart the failed VM on another host, all very orderly and controlled with 
less than a couple of seconds of downtime and no physical intervention.

We use two firewalls with CARP in a vSphere cluster, works very nicely.

The things to remember if you go with the two virtual machines are:

        1. Make sure you follow the instructions for CARP and ESX/ESXi from the 
wiki.
        2. Change the host that ESXi pings to determine its network availability. If 
you leave this as the default gateway, the ESX host that is hosting the master node 
will never fail over even in the event of a network outage, as it will still be able to 
ping the VM. This must be something that is highly available, we use the address of the 
stacked switches in our blade chassis. See 
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1002478

If you can tolerate a minute or two of downtime in the event of a host failure 
you could even consider a single pfSense VM and just trust vmWare HA to do the 
failover.

I'm pretty sure that we could live with a few minutes of downtime, so that would save the carp setup. However, I would reserve the 2 other IP addresses in all my subnets in case.



Concerns:

1- NAT Reflexion - We don't have a split-DNS setup.  CheckPoint does
seem to manage NAT Reflexion perfectly.

2- Ease to migrate the configuration to pfSense - I would set a pfSense
VM in parallel and start migrating all the rules manually, but I'm
scared about missing some or seeing a situation where the Firewall-1
can
do it and not pfSense.

3- Backups.  Are automated backups (of the config, at least) possible
even w/o a service contract?

Can people share their experience with this kind of scenario?

Don't hesitate if you need more info.

Thanks,

Ugo


pfSense works well for the most part, the Snort package has had a few issues in 
the past but once it is working it works well, NAT reflection works fine and 
see the wiki for automated backups 
(http://doc.pfsense.org/index.php/Remote_Config_Backup). The VPN options are 
excellent so I don't think you'll have any issues there. IPv6 is still not 
supported but this was not an issue in our case.


Great thanks. I thought there was problems for NAT reflection for port above 500, but is it port range over 500 ports instead? I wouldn't need that. All my internet-facing servers expose 1 to a few ports.

As you will find out, the free support provided on the mailing list is often 
better than the help you get from most CCSP's.

:)

Thanks,

Ugo

_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to