• What causes carp to failover

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    Each system in a CARP cluster sends out a "heartbeat" with its various settings (vhid, etc) skewed at a specific rate. The master is always broadcasting at the fastest rate, and each other member has a higher skew, based on the "Advertising Frequency" setting for the CARP VIP. Anything that would cause the master to stop broadcasting, or cause it to broadcast at a lower rate, would cause a failover. Could be link loss on a NIC, a dead switch port, hard lock, panic, etc, etc. Some system problems can also trigger a CARP member to skew itself higher (to advskew 240) if a hardware fault of some kind is detected.
  • CARP, failover and active downloads

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    B
    This happens for me , some networking programs have no problem (like radmin, a remote administrator) they just freeze for a couple of seconds. Others like ftp connections die. I was thinking that it's just the nature of the transfer and ftp can't compensate. At least a fail over should be a rare occurrence and we might have to live with these kinds of things.
  • Carp with PPPOE/A (Long)

    Locked
    6
    0 Votes
    6 Posts
    8k Views
    A
    bards1888, May I know more about your successful configuration? Say the WAN IP address of the fw1 & fw2? Is the PPPoE using dynamic / static ip? Many Thanks Alpha
  • Settingup of fail over

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • CARP and Redundancy

    Locked
    10
    0 Votes
    10 Posts
    5k Views
    C
    Here's an update… I changed the subnet to 24 for the LAN interface, and the virtual IP. I was able to reboot the master, and still have access to the firewall. -Thanks! :)
  • How to setup a VirtualP for my ftp server?

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    perikoP
    My ftp is working, the active mode was the solution.   Thanks.
  • Problem with carp - VIPs

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • PfS 1.2.2 "losing" ProxyARP/VIP

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    B
    I think this turned out to be a hardware issue. I'm not certain if it was a specific piece of hardware that was malfunctioning, or if it was some kind of intermittent compatibility issue. I suspected hardware after the machine started randomly locking up. I had an identical machine, so I swapped the hard drives into that one, and it had weird issues as well, but my LAN interface (which was a VLAN) wouldn't work at all, so I had to take the add-on NIC card out of the original machine and put it in this one, even I just replaced an identical card. Then it worked, but it still had random lock ups and such. From there, I migrated my whole setup to a VM, and I've had no problems. So either it was the hard drives, the original NIC, or both machines have some internal hardware issue.
  • CARP and VMware ESX 3 not working across redundant switches

    Locked
    12
    0 Votes
    12 Posts
    11k Views
    Q
    Solved, with work around. See my other posting with subject: VMWARE ESX 3.5 / vSwitch w/ 2 Physical NICs / CARP / PFSense 1.2.3 NIC-teaming/fail-over in vSphere seems to be the problem. Best regards, Quentin
  • Access to wiki to create documentation

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    Send an e-mail to wikiadmin@pfsense.org Or if you just want to write the content for the page I (or someone else with access) can add the content for you.
  • Proper Setup for Multiple IPs

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Help with multiple IP's on an interface

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    T
    So, here is what I've done so far, but I'm having problems. Define the new IP under Firewall -> Virtual IP -> Other.  Ip is 116.90.xxx.43/32 Go to Firewall -> Nat then define the following rule. Under port forward add a new rule External address: 116.90.xxx.43 protocol : TCP External Port Range: Web_Server_Ports (alias for TCP ports 22, 80 and 443) NAT_IP: Splunk server (alias for 10.0.2.41) Local Port: Web_Server_Ports Check auto create firewall rule Now, from within my network if I ssh, http or https on the IP 116.90.xxx.43 my nat works.  However when I try to hit my public IP externally it doesn't work and I don't see any denied messages in the firewall.  I'm assuming it's something wrong with the way I've defined virtual IPs.  Any ideas what I've done wrong? Thanks, Todd
  • Source IP based on Destination IP (weird question)

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    A
    That seems like it would work well, thanks! I will give it a try today.
  • Upgrade from 1.2 to 1.22 virtual IP/OPT1 to internet stops working

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Am I Being Dumb?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    GruensFroeschliG
    You also have to configure the outbound NAT to actually use the VIP.
  • A Complete CARP / Failover setup

    Locked
    14
    0 Votes
    14 Posts
    10k Views
    S
    Super! I need to get more beer then…. :D :D @dotdash: Your IT expert is right. He is the expert after all. (OpenBSD has CARPdev, which allows you to run a cluster with one public IP, but FreeBSD does not have this functionality yet)
  • Using a VIP as a IPSec endpoint IP ?

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • 0 Votes
    2 Posts
    2k Views
    E
    @Wielke: problem is we can't use any of the 80.x.x.146/147/148/149 (our public IP range) as VIP's as we can't use them after that to NAT with? Why? You can.
  • Assign vip to pfsense wan interface…

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    D
    Just a thought.  You could try dyndns and vpn to a domain name instead of having to look up the address.
  • PfSense "owns" external virtual IP's

    Locked
    4
    0 Votes
    4 Posts
    6k Views
    GruensFroeschliG
    Yes. This is due to how NAT works. You cannot NAT out the same interface on which packets arrive. For normal port forwards you can alternatively use "NAT reflection", although this is kind of an ugly hack. You "could" create on top of the 1:1 NAT forwarding, a normal NAT forwarding for the ports you need and enable NAT reflection. But i would not recommend it since you're already doing it the proper way. More relevant info in the FAQ: http://doc.pfsense.org/index.php/Why_can%27t_I_access_forwarded_ports_on_my_WAN_IP_from_my_LAN/OPTx_networks%3F http://doc.pfsense.org/index.php/Do_NAT_port_forwards_override_1:1_NAT%3F
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.