Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Dual firewalls, dual wan, carp - only one wan failing over properly

    Scheduled Pinned Locked Moved NAT
    12 Posts 2 Posters 6.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BugeyeD
      last edited by

      i've found one inconsistency so far.

      when interface macros are setup, only wan/lan macros include their respective carp interfaces. at least this is my case, with 09-20-06 snapshot. this explains my missing nat entries, and i'm fairly certain it is at least partially to blame for my wan failover problem (opt interface).

      still digging …

      1 Reply Last reply Reply Quote 0
      • S
        sullrich
        last edited by

        Can you show an example from /tmp/rules.debug of what you mean?

        1 Reply Last reply Reply Quote 0
        • B
          BugeyeD
          last edited by

          sure, here ya go:

          
          # System Aliases 
          loopback = "{ lo0 }"
          lan = "{ bge1  carp3 }"
          wan = "{ em2  carp2 }"
          TELCOVE = "{ em1 }"
          DMZ = "{ em0 }"
          PFSYNC = "{ em3 }"
          BACKUPS = "{ bge0 }"
          
          

          TELCOVE is my 2nd wan (opt1).

          lan/wan/TELCOVE/DMZ are all setup the same way: each interface has a real ip and a shared carp interface/ip as well. for whatever reason, only lan/wan carps are being included in the macros (above). that, coupled with the rules shown below, result in inconsistent nat results:

          
          nat on $wan from 172.16.0.0/12 to any -> 208.x.x.137/32
          nat on $wan from 10.0.0.0/24 to any -> 208.x.x.137/32
          nat on $wan from 192.168.0.0/16 to any -> 208.x.x.137/32
          nat on $wan from 192.192.192.0/24 to any -> 208.x.x.137/32
          nat on $TELCOVE from 172.16.0.0/12 to any -> 72.x.x.13/32
          nat on $TELCOVE from 10.0.0.0/24 to any -> 72.x.x.13/32
          nat on $TELCOVE from 192.168.0.0/16 to any -> 72.x.x.13/32
          nat on $TELCOVE from 192.192.192.0/24 to any -> 72.x.x.13/32
          
          

          and here are the results:

          
          # pfctl -s nat|grep carp
          nat on carp2 inet from 172.16.0.0/12 to any -> 208.x.x.137
          nat on carp2 inet from 10.0.0.0/24 to any -> 208.x.x.137
          nat on carp2 inet from 192.168.0.0/16 to any -> 208.x.x.137
          nat on carp2 inet from 192.192.192.0/24 to any -> 208.x.x.137
          
          

          i believe the missing carp/72.x nats may be to blame for the broken firewall failover, because failover works perfectly for conversations routed through 208(wan) yet breaks for conversations routed through 72(TELCOVE).

          1 Reply Last reply Reply Quote 0
          • S
            sullrich
            last edited by

            Oh my!  Good call  :o

            I'll get this fixed shortly.

            1 Reply Last reply Reply Quote 0
            • B
              BugeyeD
              last edited by

              @sullrich:

              Oh my!  Good call  :o

              I'll get this fixed shortly.

              do you agree that this may be what's breaking the failover?

              based on the fact that i've seen other people documenting how to get this done, i'm surprised it hasn't been brought up before. but hey, pfsense already rocks and i'm looking forward to deploying it at more customer sites.

              thanks for your hard work. just let us know how to get the fix onto our systems. :)

              1 Reply Last reply Reply Quote 0
              • S
                sullrich
                last edited by

                Use edit.php (Diagnostics -> Edit File) and load /etc/inc/filter.inc

                Now replace the file contents with : http://www.pfsense.com/~sullrich/filter.inc

                Finally, from a command prompt run, /etc/rc.filter_configure

                Does /tmp/rules.debug look better now?

                NOTE: filter.inc updated at 4:28PM EST

                1 Reply Last reply Reply Quote 0
                • B
                  BugeyeD
                  last edited by

                  @sullrich:

                  Does /tmp/rules.debug look better now?

                  without a doubt. :)

                  unfortunately, failover is still not working properly. i'll debug a bit more and post here if/when i find anything else. thanks for such a quick response.

                  1 Reply Last reply Reply Quote 0
                  • B
                    BugeyeD
                    last edited by

                    still hunting for a reason why failver is partially broken between my two firewalls, i found another possible discrepancy between the ways different interfaces are handled. there may be a checkbox somewhere i've missed, so please point it out if that's the case. what i've found is suspect for two reasons: 1) they are auto-generated and 2) they differ between WAN and OPT1 (my 2nd wan) interfaces … remember that WAN fails over properly but OPT1 does not ...

                    block drop in on ! bge1 inet from 10.0.0.0/24 to any
                    block drop in on bge1 inet6 from fe80::217:a4ff:fe3f:f53c to any
                    block drop in inet from 10.0.0.59 to any
                    block drop in on ! em1 inet from 72.x.x.0/24 to any
                    block drop in on em1 inet6 from fe80::x.x.x.x to any
                    block drop in inet from 72.x.x.11 to any
                    block drop in on ! em0 inet from 10.0.6.0/24 to any
                    block drop in on em0 inet6 from fe80::20e:cff:feb7:fabc to any
                    block drop in inet from 10.0.6.251 to any
                    block drop in on ! em3 inet from 172.31.255.248/29 to any
                    block drop in inet from 172.31.255.249 to any
                    block drop in on em3 inet6 from fe80::20e:cff:feb7:fabf to any
                    block drop in on ! bge0 inet from 10.0.2.0/24 to any
                    block drop in inet from 10.0.2.59 to any
                    block drop in on bge0 inet6 from fe80::217:a4ff:fe3f:f53d to any

                    i see BLOCK/DROP rules here, none of which are being logged. i do understand why they are there and what they are trying to protect against. what i noticed as being odd was that WAN (em2) is not represented here, whereas OPT1 (em1) is. so naturally i have to wonder if packets are getting dropped at OPT1 and not on WAN, thus breaking failover on OPT1 but not on WAN. but since logs are not being generated i can't tell for sure.

                    anybody want to comment? i'm still searching for the failover problem, so any constructive input would be greatly appreciated.

                    1 Reply Last reply Reply Quote 0
                    • S
                      sullrich
                      last edited by

                      Make sure you are on the latest version http://www.pfsense.com/~sullrich/1.0-SNAPSHOT-09-26-06/

                      1 Reply Last reply Reply Quote 0
                      • B
                        BugeyeD
                        last edited by

                        @sullrich:

                        Make sure you are on the latest version http://www.pfsense.com/~sullrich/1.0-SNAPSHOT-09-26-06/

                        ahh, zero-day-old warez. doesn't get any better than that. :) lemme push the update and see what happens.

                        1 Reply Last reply Reply Quote 0
                        • B
                          BugeyeD
                          last edited by

                          @BugeyeD:

                          i see BLOCK/DROP rules here, none of which are being logged. i do understand why they are there and what they are trying to protect against. what i noticed as being odd was that WAN (em2) is not represented here, whereas OPT1 (em1) is. so naturally i have to wonder if packets are getting dropped at OPT1 and not on WAN, thus breaking failover on OPT1 but not on WAN. but since logs are not being generated i can't tell for sure.

                          updated to the new snapshot, still have the same situation and therefore the same question.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.