Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Interface LAN stay master

    Scheduled Pinned Locked Moved HA/CARP/VIPs
    15 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • dotdashD
      dotdash
      last edited by

      I'm not 100% sure what you are asking, but if, for example, the master firewall has a WAN interface go down (let's say the cable gets knocked loose), then the virtual IPs on ALL the interfaces- LAN and WAN should go into carp backup so the other firewall can take over.

      Y 1 Reply Last reply Reply Quote 0
      • Y
        Yazur @dotdash
        last edited by

        @dotdash

        This is exactly the question I asked.

        However, I do have a problem, if what you say is true.

        Because when a "Wan disconnects" cable the interface becomes BACKUP and that of the other pfsense it becomes MASTER BUT my other interfaces do not change state and remains in MASTER on the first pfsense and BACKUP on the second.

        Would you like to have screens to better understand?

        I make you a small diagram:

        Pfsense 1:

        Wan 1 = MASTER
        Wan 2 = MASTER
        LAN = MASTER

        Pfsense 2:

        WAN 1 = BACKUP
        WAN 2 = BACKUP
        LAN = BACKUP

        If I unplug the WAN 1 cable from pfsense 1, this happens:

        Pfsense 1:

        Wan 1 = BACKUP
        Wan 2 = MASTER
        LAN = MASTER

        Pfsense 2:

        WAN 1 = MASTER
        WAN 2 = BACKUP
        LAN = BACKUP

        and if I cut the second WAN:

        Pfsense 1:

        Wan 1 = BACKUP
        Wan 2 = BACKUP
        LAN = MASTER

        Pfsense 2:

        WAN 1 = MASTER
        WAN 2 = MASTER
        LAN = BACKUP

        then the people on my LAN no longer have access to the internet because they always go through the first pfsense.

        1 Reply Last reply Reply Quote 0
        • dotdashD
          dotdash
          last edited by

          This usually indicates a problem with the layer 2 connection. Verify each firewall can ping all interfaces of the other firewall.

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by Derelict

            When a CARP interface loses link, all CARP interfaces on that node get demoted by an advskew of 240 for every down interface.

            This makes the backup assume MASTER functionality because it starts receiving CARP advertisements from the primary (on the interfaces that still have connectivity) with a higher advskew (240 if only one interface is down on the primary) than the default secondary advskew of 100.

            The secondary will assume MASTER on the interface that is down on the primary because it will stop receiving advertisements altogether.

            If this is not happening you have misconfigured your cluster. My first suspicion would be that the secondary can receive advertisements from the primary but the primary cannot receive advertisements from the secondary.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • Y
              Yazur
              last edited by

              Thank you for your answers.
              I'm taking a closer look at that.

              Wouldn't the communication be over all interfaces or just the one used for the synchronization mentioned in "high availability synchronization in system"?

              I just checked that the interfaces are pinging each other and it is the case with diagnostic and ping proposed by pfsense.

              Then I had configured a Vlan on the "CARP" interface and it is good.

              I added the following "access list" on all interfaces:

              1ef07a13-affe-4656-8c38-727691b3f572-image.png

              I'll do some tests early next week.

              If you have ideas of bad configurations don't hesitate to let me know.

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Please read the sticky in this category.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  That rule makes absolutely no sense on a LAN interface. I don't think it makes any sense on any interface. See the above referenced sticky post.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • Y
                    Yazur
                    last edited by

                    Thanks, I've been going over the sticky post again.
                    So it's the CARP protocol that toggles the state of the interfaces.
                    My problem comes from this protocol and more particularly the "layer 2" link which is not good.
                    Would it be interesting to change the protocol of the "Pfsync" rule to "CARP", if the problem comes from a firewall block because of an ACL?
                    Or doesn't it make sense?

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      No.

                      You do not need to specifically pass CARP. It is passed automatically.

                      You probably want to read everything here:

                      https://docs.netgate.com/pfsense/en/latest/book/highavailability/index.html

                      And here:

                      https://docs.netgate.com/pfsense/en/latest/solutions/reference/highavailability/index.html

                      The second one is tailored to Netgate devices but the general principles are the same for all HA clusters.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • Y
                        Yazur
                        last edited by

                        Thank you, I'm going to look at all this documentation and I'll come back to tell you the solution to the problem or more specific questions for more specific help.

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.