NEW CARP Setup seems to have a mind of it's own and secret firewall rules - limited/no logs
-
This is a quick diagram, doesn't show all the access layer etc..
-
OK that tells us nothing about how you have it configured.
-
@Derelict I know, notes coming!
-
does
grep 1566102523 /tmp/rules.debug
show anything? -
@Derelict nope it returns nothing and when I look in the debug file again I don't see that rule.
FYI, the other item I'm not sure we changed was to edit the manual outbound NAT rules in the same way we did for the WAN it from the interface to the VIP. I just thought of that, not sure how that relates to these lost rules
-
No idea what that means. You only need outbound NAT for WANs in general.
-
thanks, that answers that then!
-
Set outbound NAT on WANs to a CARP VIP for sources that need NAT (inside networks, etc. NOT localhost or the WAN subnet or source any)
Set DHCP to give a LAN CARP VIP as the default gateway to inside hosts.
Set DHCP to give a CARP VIP as the DNS server to inside hosts if you are using pfSense for DNS.
Configure the failover peer in the DHCP servers on the Primary to the IP address ON THAT INTERFACE on the secondary.
Configure XMLRPC sync on the sync interface on the primary to the secondary - not the other way around.
Configure pfsync on the sync interface bidirectionally on both nodes.
That's pretty much it.
-
Thanks @Derelict I'll step through this all again now and check them off, the only one I know didn't work the last time was DNS (line below). But I'll test that agin on a VLAN now being used. FYI, we're using DNS Resolver (within pfSense)
Set DHCP to give a CARP VIP as the DNS server to inside hosts if you are using pfSense for DNS.
-
It should work for DNS to send them to both nodes' interface addresses but if one is down it will have to time out and might induce client-perceptible delays. If you want multiple DNS servers for your clients my suggestion would be to put them on something off the firewall/HA pair, such as dedicated unbound/BIND servers, domain controllers, etc.
-
@Derelict Yes understood and we tried to set it to the CARP vip it just didn't provide an DNS resolution. But testing again now
-
You can always just
dig @carp_vip www.google.com
from an inside host to see if unbound is listening there. It should be. -
@Derelict it looks like DNS on the .1 (CARP VIP) works on the two OPT networks (GUEST and LAB) but not on the LAN Network. I just get a timed out when I try and lookup against DNS on the LAN CARP VIP
-
Are you passing DNS traffic to the LAN CARP VIP on that interface?
Did you change the default listening interfaces on unbound from All?
Is the source address of the query from an address on a pfSense interface or from a network routed from a downstream router on LAN?
Anything interesting logged in the DNS Resolver logs?
-
Hi Have the interface in DNS Resolver setup with the LAN and LAN CARP VIP highlighted.
If I try and do a packet capture of the firewall on the LAN interface for that LAN CARP VIP, I don't see any traffic for a DNS lookup or even a PING (which works).
FYI< I checked this on both firewalls to be sure.
Hass
-
I tried a DENY rule to see if I could just get the firewall to say something but no dice
-
!!!!!!!!, it might have been the old Firewall, it had been disabled but when I took a loot at it, it still had a light of lights on the ports... I'm going back through all my testing now.
I just wanted to let you know @Derelict
-
@Derelict Just wanted to let you know know it's looking allot better now and I think it was just that lingering interface that should have been down that caused the issue (which then caused others).
Thanks for coming back so quick on a Sunday. FYI, I've now hit another Intel 10G known issue which I'll post once I re-read the previous ones