• Pfsync: crossover or switch?

    3
    0 Votes
    3 Posts
    2k Views
    KOMK
    I've set up replicating SANs before and I've always just used a crossover cable for the synchronization interface.  I don't trust another piece of electronic equipment in the mix for no reason, and I've never had a problem with direct-connected interfaces.
  • CARP & Hyper-V on 2.2 RELEASE

    8
    0 Votes
    8 Posts
    4k Views
    P
    @doubledgedboard: So, I'm fine setting up the network aspects, but from my initial research it looks like single-wan-ip CARP doesn't work as well with DHCP WAN IPs. From what I've read, it can be done, but I have to manually assign the gateway on the slave when a failover occurs? Is this true, or is there a better way to handle DHCP WAN? As Jims said - https://forum.pfsense.org/index.php?topic=63319.msg342542#msg342542 so I don't think it would work out of box with DHCP WAN IP, but with single-wan-ip it should work.
  • VIP Access From LAN

    5
    0 Votes
    5 Posts
    1k Views
    E
    Thanks -  if I curl the WAN IP it's returning the internal address, I don't have any rules setup to allow the webconfigurator on the WAN port. Port forwarding + NAT Proxy appears to have worked, I didn't realise there is a difference with 1:1 NAT Thanks for your help!
  • CARP not working as expected

    8
    0 Votes
    8 Posts
    2k Views
    N
    Then my setup will not work.hmm ugly
  • NTP broken in CARP

    1
    0 Votes
    1 Posts
    827 Views
    No one has replied
  • CARP failover not routing properly

    5
    0 Votes
    5 Posts
    1k Views
    M
    @cmb: Likely from those IPs not working in general on the secondary, assuming they're CARP IPs or IP aliases with a CARP parent. While failed over if you go to Diag>Ping on the secondary, source from one of the affected IPs, and ping out to something on the Internet, does it work? Are these physical boxes, or VMs? Most common reason that comes to mind is VMware without appropriate vswitch config to allow the CARP virtual MACs to be used on the secondary system. These are physical boxes.  I haven't actually tried the Diag>Ping on the secondary when the failover occurs.  I'll do that next time it fails over.  But at least right now, I can ping from an external source both WANs of both pfsense boxes, in addition to the CARP VIP shared between them on each WAN.  If it were a problem from the IPs not working in general, would I not be able to ping the secondary's? For reference, the IPs are set up like so (and as of right now, I can ping all of them externally): BR network: pfsense01:  208.xxx.xxx.171  (NIC's actual address) pfsense02:  208.xxx.xxx.172  (NIC's actual address) BR VIP:        208.xxx.xxx.170  (CARP VIP shared between the two IPs above) CH network: pfsense01:  71.xxx.xxx.19  (NIC's actual address) pfsense02:  71.xxx.xxx.20  (NIC's actual address) BR VIP:        71.xxx.xxx.18  (CARP VIP shared between the two IPs above) @nikkon: @cmb: What type of VPNs? What traffic no longer works? Specific to certain NATed IPs, or? OpenVPN only. In our case, we don't use OpenVPN currently, our site-to-sites are IPSec.
  • Carp alternative for failover?

    1
    0 Votes
    1 Posts
    653 Views
    No one has replied
  • SSH connection state not preserved during failover

    8
    0 Votes
    8 Posts
    2k Views
    W
    Outbound NAT rule maps all LAN connections to the WAN CARP IP: 172.16.0.1
  • Pfsync and CARP failover sequence

    Locked
    7
    0 Votes
    7 Posts
    3k Views
    W
    I agree, this is my setup so far: (for tests) Interfaces - FW-master:   WAN: 172.16.0.10/23   WAN-Carp: 172.16.0.1/23 _LAN: 192.168.0.10/23   LAN-Carp: 192.168.0.1/23 Sync: 172.16.2.1/23 FW-Slave:   WAN: 172.16.0.20/23   LAN: 192.168.0.23/23 Sync: 172.16.2.2/23 Any ping tests I do, have no issues, the failover is pretty seamless, however, if I run a SSH session running, at a failover [Master -> Slave or vice-versa], the SSH session fails. Since the ping tests works I am inclined to say the Failover works, but the states are not being maintained at failover hence SSH fails. Any insight on what I might be missing. I followed instructions outlined here to get this up: https://doc.pfsense.org/index.php/Configuring_pfSense_Hardware_Redundancy_(CARP) I am not sure if there is anything apart from setup itself that would cause this behavior. Both nodes are running on dedicated hardware._
  • Upgrade procedure 2.1.5->2.2 with CARP active

    2
    0 Votes
    2 Posts
    1k Views
    V
    https://doc.pfsense.org/index.php/Upgrade_Guide#Upgrading_High_Availability_Deployments I've upgraded a CARP system from 2.1.4 as described there. No issue. However, in CARP mixed mode 2.1.x + 2.2 the states are not synced to slave, so connections are lost if the 2.1.x master take over CARP master again. E.g. if you restart the machine. If you don't want that pull out the WAN cable.
  • CARP not working after upgrade from 2.1.5 to 2.2

    7
    0 Votes
    7 Posts
    2k Views
    M
    Dear All, I am still facing the issue that CARP is not working. The last interface coming up becomes master regardless of the skew setting. Could someone please be so kind as to write in a few words how the requirements for getting CARP to work in version 2.2 differs from what is written in the draft book on 2.1 in chapter 25, in particular the example redundant configuration on page 472ff ? From what I gather, CARP in 2.2 still generates an interface which reads like XXX.XXX.XXX.1 (LAN CARP VIP), i.e., the typical router IP on a typical LAN and XXX.XXX.XXX.2 (WAN CARP VIP), i.e. not the typical router IP on a typical WAN. Behind NAT, I suspect that one still has to create manual outbound rules translating to the WAN CARP VIP(s). Thank you very much, Michael
  • VIP + 1:1 NAT on CARP Setup Not Working When Slave Online

    3
    0 Votes
    3 Posts
    1k Views
    S
    Thanks for the reply cmb! Yes, thats very likely the case. I finally RTFM and found that I need to setup these as CARP VIPs as well, which I did… then I brought the secondary pfSense box online and it decided to pick up some VPN connections that were already established on the master. The connections are listening on the CARP interfaces so Im not quite sure what happened this time. Looks like im going to be working on this over the weekend. I will check back and confirm as far as this particular issue goes.
  • Master/Slave Manual Failover

    4
    0 Votes
    4 Posts
    3k Views
    C
    You can accomplish that with the "Persistent CARP Maintenance Mode" on 2.2. Just click that button under Status>CARP and it'll bump the advskew on that system to 254, leaving it in backup status unless the secondary disappears.
  • CARP High Availability with 5 source NAT IPs, failover

    1
    0 Votes
    1 Posts
    670 Views
    No one has replied
  • 0 Votes
    2 Posts
    998 Views
    M
    Answered here https://forum.pfsense.org/index.php?topic=87813.msg483500#msg483500 This really should be in the upgrade notes.
  • Upgrade to 2.2 from 2.1.5

    7
    0 Votes
    7 Posts
    2k Views
    V
    @Guldil: https://doc.pfsense.org/index.php/UpgradeGuide#Upgrading_High_Availability_Deployments Nothing about 2.1.5 to 2.2 I'll try the procedure like i did before (slave first, carp off on master, then master). I've just finished upgrading my CARP set based on 2 DELL R220II as recommended there and at the end it works great. However, upgrading the backup box at first, messed my outbound NAT settings. Automatic mode was activated and therefore it used the WAN address instead of CARP VIP. In result, connections which were made from inside to web services secured by IP authorization were rejected. Upgrade of master worked as expected. I am happy now.  :)
  • *solved* One CARP master on slave

    1
    0 Votes
    1 Posts
    741 Views
    No one has replied
  • Multiple Carp on an interface (2.2 vs 2.1 broadcast behavior)

    2
    0 Votes
    2 Posts
    861 Views
    C
    It still works the same in regards to multicast. The fact it doesn't have an additional interface isn't really of any functional consequence from a user's perspective.
  • CARP + NAT reflection - interface IP instead CARP IP

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ
    No difference on 2.2 Split DNS is the better fix.
  • 0 Votes
    3 Posts
    1k Views
    S
    Ok, I see uniqids got introduced in https://github.com/pfsense/pfsense/commit/89f171b052fbe72aed654d2a1c3d5a24e9bf9902 hmmm… Need to stop tinkering with this since its beyond my understanding. For sure I thought uniqid should show up in config.xml for CARP VIPs but maybe some sort of magic is going on behind the scenes someplace. -Shahid
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.