Here is why NAS functionality on pfsense can make a hell lot of sense.
-
Many consumer routers come with a USB port to simulate a NAS type of storage, but many consumer routers also have security problems related to this sort of technology. I believe the developers of PFSense could do it correctly, but it really feels like the wrong type of feature to implement on the PFSense platform.
PFSense is designed to be an expandable/modular driven firewall solution for protecting 1 or many networks. Developing "frills" isn't a way forward for a product with a strong focus on security and stability.
If an "All in one" solution is something you would prefer, then I would suggest a typical off the shelf product and flash it with dd-wrt/tomato or a variant if you feel the need.
I think it's noteworthy that you hold PFSense in such high regard and wish to use it as your "All in one" platform, but demanding that a product team implement a feature that hasn't gained traction for obvious reasons is the wrong way to solve your problem.
-
I don't know who or what to believe anymore.
I just read this forum post on the FreeNAS forums:FreeNAS is awesome. FreeNAS can and will run as a VM. That does not make it a good idea.
-
FreeNAS is designed to run on bare metal, without any clever storage systems (UNIX/VMFS filesystem layers, RAID card caches, etc!) getting in the way. Think about this: ZFS is designed to implement the functionality of a RAID controller. However, its cache is your system's RAM, and its processor is your system's CPU, both of which are probably a lot larger and faster than your hardware RAID controller's cache!
-
Without direct access to the hard drives, FreeNAS lacks the ability to read SMART data and identify other developing problems or storage failures.
-
A lot of the power of FreeNAS comes from ZFS. Passing a single virtual disk to ZFS to be shared out via FreeNAS is relatively safe, except that ZFS will only be able to detect and not actually correct any errors that are found, even if there is redundancy in the underlying storage.
-
There is a great temptation to create multiple virtual disks on top of nonredundant datastores in order to gain "MOAR SPACE!!!". This is dangerous. Some specific issues to concern yourself with: The data is unretrievable without the hypervisor software, the hypervisor might be reordering data on the way out (which makes the pool at least temporarily inconsistent), and the hypervisor almost certainly handles device failures non-gracefully, resulting in problems from locked up VM to unbootable VM, plus interesting challenges once you've replaced the failed device.
-
Passing your hard disks to ZFS as RDM to gain the benefits of ZFS and virtualization seems like it would make sense, except that the actual experiences of FreeNAS users is that this works great, right up until something bad happens, at which point usually more wrong things happen, and it becomes a nightmare scenario to work out what has happened with RDM, and in many instances, users have lost their pool. VMware does not support using RDM in this manner, and relying on hacking up your VM config file to force it to happen is dangerous and risky.
-
FreeNAS with hardware PCI passthrough of the storage controller (Intel VT-d) is a smart idea, as it actually addresses the three points above. However, PCI passthrough on most consumer and prosumer grade motherboards is unlikely to work reliably. VT-d for your storage controller is dangerous and risky to your pool. A few server manufacturers seem to have a handle on making this work correctly, but do NOT assume that your non-server-grade board will reliably support this (even if it appears to).
-
Virtualization tempts people to under-resource a FreeNAS instance. FreeNAS can, and will, use as much RAM as you throw at it, for example. Making a 4GB FreeNAS VM may leave you 12GB for other VM's, but is placing your FreeNAS at a dangerously low amount of RAM. 8GB is the floor, the minimum.
-
The vast majority of wannabe-virtualizers seem to want to run FreeNAS in order to provide additional reliable VM storage. Great idea, except that virtualization software typically wants its datastores to all be available prior to powering on VM's, which creates a bootstrap paradox. Put simply, this doesn't work, at least not without lots of manual intervention, timeouts during rebooting, and other headaches. (2013 note, ESXi 5.5 may offer a way around this.)
I'm pretty sure I'm forgetting a few. But the conclusion is this: it's perfectly fine to experiment with FreeNAS in a VM. However, if you run it in production, put your valuable data on it, and then something bad happens, and you absolutely positively must get your data back, there probably won't be a lot of help available from the forum. We've seen it happen again, and again, and again. Sigh.
So is it a bad idea or not? I mean that post does clearly imply that it is. Now the question is how biased each party is..
-
-
More a subject to be hashed out on the freenas forums. Why are you here looking for FreeNAS expertise?
In case you haven't figured it out, it doesn't appear that anybody here is interested.
If you want pfSense and FreeNAS on the same hardware, virtualize (at your own risk.)
Your aforementioned old hardware will almost certainly lack VT-d support.
-
I've not delved too deeply into the current state of the art of FreeNAS so you may take my next comments with some grain of salt.
That said, I have noted there seems to be a current "battle" between FreeNAS and Nas4Free (a recent fork of FreeNAS) on a whole range of issues, some of which you've touched upon.
As far as the include a "NAS in pfSense" debate, everything you've touched on is evidence in my mind NOT to include a NAS in pfSense.
Perhaps VM is the way to go, perhaps not, but it's pretty obvious to me from your quote that a NAS has really different issues of concern than a firewall.
No point in trying to shoehorn them together.As Derelict mentioned, I think you've moved off of this being a pfSense issue.
I'd suggest a little research into the current NAS distro issues and where you want to go from here. -
I don't know who or what to believe anymore.
I just read this forum post on the FreeNAS forums:~snip~
So is it a bad idea or not? I mean that post does clearly imply that it is. Now the question is how biased each party is..
Keep it in context. That post is directed, as clearly stated if you would read it further, to individuals who don't know what they are doing with virtualization. That post was authored to clearly state that if you virtualize FreeNAS and bad things happen you are on your own and will get no support from the forums fixing it. It does not say that you can't or shouldn't, it says you shouldn't unless you know what you are doing. And if you have to ask then you don't know what you are doing.
But don't take my word for it, go over there and pitch your proposed idea of a combined router/firewall and NAS and see the type of response you get.
-
@Jailer
Well, as far as I understood the post, it pretty much says, "if something goes bad, you lose your data, unless you had vt-d".@divsys
I think the argument that the "solution" would be to run FreeNAS in a vm on pfsense is pretty much eliminated now. (please correct me if I'm wrong)
And I had a gazillion points for why it would make a lot of sense in certain cases to not run the firewall/router and the NAS on separate devices. (see first post if you don't remember)
This whole discussion until this point was all about people telling me that virtualization is the solution.
So as far as I see it, the discussion I was looking for in the first place may start now ("NAS service on pfsense" vs "separate devices").And I can only repeat myself over and over again. An optional service that you don't chose to use doesn't bare any risks for you.
And users like me (who don't even have sensitive data) who would want to use such a service (to save a significant amount of money) wouldn't even care about the risks (if they even existed). -
"unless you had vt-d""
You do NOT need vt-d to pass your hdd to your VM natively… Atleast not in in esxi its a simple raw map..
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1017530 -
So correct me if I'm wrong (I'm very much a noob here), but pfsense already combines two very different but common sense functions - routing and firewalls. Why is it such a stretch to think that NAS is so far removed from these two worlds? We're talking about network management, which includes storage.
Also, why doesn't anyone seem to recognize that the Apple Time Capsule is basically exactly what the user is describing? Sure, the target demographic for Apple is set-it-and-forget-it consumers who aren't as security savvy, but Apple is pretty invested in building a secure product. A pfsense router/firewall seems like a much better partner for an NAS backup solution than an out of the box Apple product. I for one would love a single solution for all my network related needs.
-
Why is it such a stretch to think that NAS is so far removed from these two worlds?
??? One involves handling of network traffic, the other concerns itself with data on hard disks. Same reason your basic fridge doesn't have a wine chiller, a Frappuccino maker and a toaster oven all built-in, even though it sounds amazing.
We're talking about network management, which includes storage.
Well, not really, other than your NAS is just another device on the network. My TV is on my network at home, but I wouldn't consider television to be a part of network management.
I've been in IT for almost 30 years now, and I've learned the hard way that one service per device is usually best. Building a monolithic server stack is great until it falls over and takes everything out.
-
So correct me if I'm wrong (I'm very much a noob here), but pfsense already combines two very different but common sense functions - routing and firewalls.
There is no firewall that separates routing functions, they're inherently required in combination and aren't very different at all. Where you leap from firewall to file server, that's a very different function.
Those who think this is a good idea aren't really our target market. Do you get a NAS built into your Cisco ASA or Sonicwall or Checkpoint or Watchguard or any other similar class product? No.
All the solutions that try to be everything to everyone end up doing everything poorly.
Moot point, as we now have bhyve. Run your NAS in bhyve.
So is it a bad idea or not? I mean that post does clearly imply that it is. Now the question is how biased each party is..
Some of those points are valid, some are FUD, but it's largely just that people get themselves into a situation that's more complex than they know how to handle. Granted, if you want to run ZFS, you're either going to want to run on bare metal or with a controller you can passthrough to the NAS VM.
-
My definition of "correct" is the physical hardware. I figure I need at least $2k to get started. I won't go for anything less than 1TiB of logical, back by all SSDs of several different brands, Xeon, 10Gb NIC+switch, and 64GiB of DDR4. The bigger issue is finding some good hot-swap hardware(bays)
From my POV you've stepped from the "Build my own NAS" to the "Build my own Server" maybe a change of perspective is in order…...
A NAS that isn't a server is a toy, not a tool. Like getting a NAS from a Happy Meal.
I think I got jaded when I was young. My dad purchased some cheaper computers and they were so annoying to work with, I stopped using them all together. I gave up using computers for almost a year and my dad wondered why. I told him, get something better or nothing at all. Of course I used my own money to help augment the price differences.
I refuse to work with cheap hardware. This is why I have an Intel i210-T1 on my desktop. Screw RealTek integrated. I have 3 SSDs in all of my computers, in case one dies. I did not order any computers until I could afford at least 2 SSDs. I don't need high availability and RAID controllers, but I do need fall-back plans. When I get a new computer, 1 week of CPU and memory burn-ins, split about 4 days of memtest and 3 days of CPU, which also stresses the memory during parts.
If you're going to do it, do it well or don't do it at all.
-
Almost every consumer grade router has built-in NAS functionality nowadays
In the past someof this NAS-routers where seen from Netgear, ASUS and other vendors, for sure
if anybody means that is the right thing for him self, he should go and buy and use it.Examples please.
AVM Fritz!Box Router comes with a NAS "function"
Netgear was launching a so called NAS-router (a router with a inserted HDD/SSD)
ASUS was also setting up on of that devices but with no really market gainA firewall is a security based and focused device that is using rules or rule sets to separate
networks from one or more other networks, and a router is routing packets from one to another
or more networks, and why a firewall also can route packets it might be not putting these devices
in the same class of things.There are many NAS solutions out there that can be easily used together with pfSense, but so
both of them would be able to do his own job the code was written for. So why both systems
should be installed together on one unit opening then more security holes or risks that are unwanted?Because some of the users love to be get more comfort? I would love to see more security things in
a firewall and usability in a NAS and not both together on one system.Also for the developers it would be a nightmare because the NAS fraction want to insert all new and
fancy things and the firewall guys want to insert lees as able to do, related to security holes and we
all have to wait for the new product or version for ever? No I don´t want this.Let them run in two different VMs or stand alone, this might be the best compromise for all customers
and the development staff too.@NopIt
it is an older thread but about the same thing we are talking here, you could have a look inside if you
want and will be able to imagine that this would perhaps a really often thought or idea, but it is not really
matching the security point and there fore it is better as it is likes now in my opinion. Link to the therad -
Too many people are worry about security, when there no such thing is 100% vulnerability free. Would be nice to have the feature for the ones that want to use it, would allow this old HP DL380 G6 I got to do more than just be a "firewall"
-
Too many people are worry about security,
Should we not talking about if we are talking about our firewalls?
when there no such thing is 100% vulnerability free.
For sure you are right but many peoples are working very on pfSense to be 100% worry free!
And know because some want to get a nice gimmick the entire rest must go home or live with
a potential unsecure firewall? I really don´t think so.Would be nice to have the feature for the ones that want to use it,
You are free to hire someone who will be wrtiting the code for such a packet, here.
would allow this old HP DL380 G6 I got to do more than just be a "firewall"
In the pfSense shop or at Netgate are many devices that could be really a nice and fast firewall
only. And they are all saving electric power on top. So no one was pressing you to go by this PC. -
@BlueKobold:
Too many people are worry about security,
Should we not talking about if we are talking about our firewalls?
when there no such thing is 100% vulnerability free.
For sure you are right but many peoples are working very on pfSense to be 100% worry free!
And know because some want to get a nice gimmick the entire rest must go home or live with
a potential unsecure firewall? I really don´t think so.Would be nice to have the feature for the ones that want to use it,
You are free to hire someone who will be wrtiting the code for such a packet, here.
would allow this old HP DL380 G6 I got to do more than just be a "firewall"
In the pfSense shop or at Netgate are many devices that could be really a nice and fast firewall
only. And they are all saving electric power on top. So no one was pressing you to go by this PC.Firewall that I would call cute at most, if you want to talk firewalls pair Cisco FirePOWER with OpenDNS Umbrella. I just see to many people bash down on ideas to innovate, not like I'm worry about how good pfSense works. My old appliance die and I had mess load of DL380 from work which I loaded up my Porsche with and sold most of them on eBay. Now I got 12 core, 48Gb, 4x Pro/1000 ET Quad with 6TB of light speed storage firewall for no reason at all. I was just thinking about having Samba on it and intewebs lead me here. Some people would call wearing a 6 foot fox fursuit with a socialist armband a gimmick too.
Foxler
-
Too many people are worry about security
:o
-
I don't think pfsense should develop NAS capability, I just think it'd be nice to run them both on the same box without vm. I mean, the only thing separating them now is an Ethernet cable, why not do away with the physical separation and have a robust software integration that is security conscious AND feature rich. Let them share what they can share and keep separate what needs to be separate. A pfsense based time capsule would be killer.
-
luckily this will probably never happen.
if people wish to dig their own grave then they should do so, i guess.
-
I spent some more time thinking about this and I still think that all the security concerns are complete BS.
I mean if you think about it, having anything sensitive on a computer that has a browser or Windows on it (or even better: android) is a gazzilion times more risky.
Just think about the million Flash and browser vulnerabilities.
In my opinion everyone who argues that NAS and router on the same device is stupid has no right to run Windows in a network with private data. Period.
But I'm sure you all have figured this out and are running a separate computer for every program. One for the emails, one for the browser, one for the notepad, one for the calculator and one for minesweeper. I mean you would probably get hacked within a minute if you were to run all these on the same device, right?But (I probably said this a million times by now) what makes you think that pfsense would be any less secure when you install a NAS package on it? I mean seriously WHAT EXACTLY do you think would cause pfsense to be any less secure? I mean the NAS package would have no reason to temper with the router config and I highly doubt that pfsense would accidentally create a vulnerability upon spotting a NAS package.
-
NopIt,
I'm not sure why you are beating a dead horse; you have already been provided an answer and venting is not likely to change anything.
The fact that Windows is not very secure does not justify NAS functionality being added to pfSense. I do not follow this logic. As a security professional, I would not want NAS functionality added to pfSense.
If you have a decent enough computer with a few network cards on it, consider loading the free VMware ESXi hypervisor on it and then load FreeNAS and pfSense as separate virtual machines (VM) on ESXi. This will allow you to share hardware for both services. I personally do this for several services on my home network including Plex, SABnzbd, Deluge, etc., all running Ubuntu server on separate VM's. Pfsense would also run fine as a VM, but I prefer a dedicated box for this so that I can do maintenance on ESXi whenever I please without impacting internet service.
Just my 2 cents.