Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    CARP on ESXi and promiscuous mode, security issues?

    HA/CARP/VIPs
    1
    4
    967
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      Gabri.91
      last edited by

      Hi all,
      I've set-up 2 pfSense in CARP on two ESXi nodes and, as per documentation, I've created another port-group only for pfSense with promiscuos mode enabled.

      Problem is that now pfSense receives all traffic that goes to the Virtual Switch, so LAN interface it's "flooded" by unwanted traffic and, more important, from within pfSense it's possible to sniff all the traffic that goes through the virtual switch.

      Is there another way to be able to have CARP working on ESXi without promiscuous mode? If not, IMHO it should be highlighted in documentation that security (and performance) risk related to promiscuous mode..

      1 Reply Last reply Reply Quote 0
      • G
        Gabri.91
        last edited by Gabri.91

        FYI looks that on ESXi 6.7 (and 7 I guess) could be solved with this:
        https://www.virtuallyghetto.com/2018/04/native-mac-learning-in-vsphere-6-7-removes-the-need-for-promiscuous-mode-for-nested-esxi.html

        I'm implementing and testing it right now, probably pfSense documentation should be updated..

        1 Reply Last reply Reply Quote 0
        • G
          Gabri.91
          last edited by

          Hmmm it's working for other interfaces (DMZ) but not for LAN, really strange...

          1 Reply Last reply Reply Quote 0
          • G
            Gabri.91
            last edited by

            So, finally I've discovered that there is probably a bug in my HP SFP552 10GB cards that do not allow native Mac Learning to work on untagged port groups, moved to tagged port group, now everything it's working properly and I don't have anymore pfSense flooded with all traffic of promiscuous mode.

            I think documentation should be updated reflecting this improvement.

            1 Reply Last reply Reply Quote 1
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.