• 0 Votes
    3 Posts
    318 Views
    K
    @Gertjan Looks very similar. Thank you!
  • 0 Votes
    22 Posts
    2k Views
    N
    @stephenw10 I sent you a chat
  • NAT 1:1 configuration in HA-CARP mode

    NAT nat carp ha carp
    8
    0 Votes
    8 Posts
    820 Views
    empbillyE
    @SteveITS said in NAT 1:1 configuration in HA-CARP mode: For your IP alias I think /32 is wrong: @viragomann said in NAT 1:1 configuration in HA-CARP mode: So there is something wrong with this IP or the CARP VIP, which you should troubleshoot. Check the logs for hints. Hooking up the IP alias on the CARP VIP is necessary for proper failover. If you just set it on the interface it can never failover to the secondary. Thank you both for your help!!! I've set up a new carp just for this type of 1:1 NAT situation and I'm doing a port forward.
  • 0 Votes
    9 Posts
    1k Views
    stephenw10S
    I agree, internal ticket opened.
  • 0 Votes
    3 Posts
    794 Views
    JeGrJ
    @Sperber said in Dual OpenVPN-Setting, CARP & Failover (HA, MultiWAN): (Vorkbaard hat das bereits beschrieben: https://vorkbaard.nl/openvpn-in-a-pfsense-carp-cluster/ ) Die Info ist aber relativ alt und nicht zutreffen. Wir haben da sehr verschiedene und komplexe Services laufen und keiner braucht irgendwelche seltsamen Settings mit "local <extIP>" o.ä. - das sollte heute überhaupt nicht mehr nötig sein. Macht im CARP Setup auch keinen Sinn, da die CARP VIPs alle auf dem Master laufen und man diese so nicht ansprechen kann. Split CARP mit Master/Backup auf dem selben Node ist in der FreeBSD Variante von CARP/pf nicht enthalten, das ist leider nur in OpenBSD enthalten. Mich interessiert allerdings auch wie @viragomann wie man überhaupt auf der 2. pfSense im CARP die Annahme von OpenVPN erlauben will. Der Traffic kommt ja nicht bei ihr an, weil der via CARP IMMER zur primären läuft, nicht auf den sekundären Node. Und wenn man das forwarden sollte auf Node 2, würde der Node versuchen asymmetrisch zu antworten (oder es läuft alles wieder über Node1), was auch wieder nicht sehr schön ist. Wie ist das also realisiert, dass die Clients sich auf Node2 connecten und das auch funktioniert, wenn Node2 mal aktiv wird und Node1 passiv weil vlt. gerade gewartet wird o.ä.? Ansonsten wäre mir schleierhaft wie das im Redundanzfall wirklich sauber funktionieren sollte ohne dass manuell eingegriffen wird? Cheers \jens
  • IPsec tunnels not connecting during CARP HA failover

    IPsec carp ipsec
    3
    0 Votes
    3 Posts
    1k Views
    T
    Wanted to add a bit more info here as this issue remains even after upgrading to 2.6.0 today. My tunnels are IKEv2 in VTI mode. Under Phase 1 Advanced Options, I set "Child SA Start Action" to "Initiate at start (VTI or Tunnel Mode)" and "Child SA Close Action" to "Restart/Reconnect" Under Phase 2 > Keep Alive, I use a host on the other side of the tunnel with Keep Alive "Enable periodic keep alive check". The tunnels do not establish if I shut down the MASTER CARP node or "Enter Persistent CARP Maintenance Mode" on the MASTER CARP node. I have to click Connect to manually establish the tunnels. Seeing these messages in the IPsec System Log charon[43289]: 04[CFG] trap not found, unable to acquire reqid 5002 Have anyone else seen this issue?
  • 0 Votes
    22 Posts
    4k Views
    T
    @stephenw10 The AWS side will likely propagate whatever you advertise to it, because I manage both ends and that's just how the virtual private gateway works in AWS. I guess there might be a slight risk here, but hopefully AWS won't make a change that reject these routes. Of course, ideally I hope that pfSense will allow the source to be configured in a future release of the OS. As far as I know, other firewall vendors are able to do so. /Thomas
  • 0 Votes
    1 Posts
    845 Views
    No one has replied
  • 0 Votes
    1 Posts
    941 Views
    No one has replied
  • 0 Votes
    1 Posts
    432 Views
    No one has replied
  • 0 Votes
    1 Posts
    655 Views
    No one has replied
  • Advskew and Gateway Status

    HA/CARP/VIPs advskew carp gateway script
    1
    0 Votes
    1 Posts
    846 Views
    No one has replied
  • Choose CARP interface priority

    HA/CARP/VIPs carp lan side
    1
    0 Votes
    1 Posts
    842 Views
    No one has replied
  • 0 Votes
    1 Posts
    496 Views
    No one has replied
  • 0 Votes
    4 Posts
    1k Views
    DerelictD
    The best way to do an HA deployment is it invest in the gear necessary to build it correctly. Bridging like that is generally incompatible with pfSense HA. https://docs.netgate.com/pfsense/en/latest/highavailability/layer-2-redundancy.html
  • CARP dual Master for short period

    HA/CARP/VIPs carp
    2
    0 Votes
    2 Posts
    745 Views
    junicastJ
    As it turned out there was a loop on an interface which caused that behavior, sad but true.
  • Problem with Virtual IP

    HA/CARP/VIPs pfsense virtualip configuration carp failover
    10
    0 Votes
    10 Posts
    2k Views
    S
    It can depend on the switch/router on the other end of the cable. For instance with Comcast routers often when replacing a router in an office (inside the Comcast router) I've found it's fastest to power off or reboot the Comcast router so it learns the IP has a new MAC. If you have the second router on, and are just plugging in cables, I would wonder if restarting the second router (or just leaving it off and powering it on) would help. But overall CARP set up properly works basically instantly so that would be preferred. https://docs.netgate.com/pfsense/en/latest/book/highavailability/index.html
  • Odd HA-Deployment

    General pfSense Questions carp virtualization kvm
    1
    0 Votes
    1 Posts
    549 Views
    No one has replied
  • VHID VIP Clarification

    HA/CARP/VIPs vip carp vhid
    3
    0 Votes
    3 Posts
    2k Views
    JeGrJ
    CARP/VRRP/etc. are using not only virtual IPs but also virtual MACs to make failover a smooth experience without clients or network equipment having to learn a new MAC address of a failover server like with only IP based configurations (early linux HA cluster for example). The VHID setting is influencing which MAC is handed out for that CARP style VIP. All of them are (IMHO) using the failover MAC space of 00:00:5E:00:01:XX so with changing the VHID you are also configuring the last "XX" segment of said MAC address. That's why it has to be unique on that network segment (L2) and you also have to watch out for other cluster/HA-grade setups, that are using VRRP or HSRP style VIP/MAC combinations. But if your pfSense cluster is the only cluster in that network segment, VHID 1 is commonly fine on all interfaces. We're using VHID 4 and 6 (for IP4 / IP6 VIPs on the same VLAN) over multiple VLANs just fine :)
  • Multi IGMP Proxy Behaviour

    General pfSense Questions igmpproxy igmp carp
    2
    0 Votes
    2 Posts
    1k Views
    M
    @mannyjacobs73 said in Multi IGMP Proxy Behaviour: lthough I understand there is a difference between IGMP Snooping and IGMP Proxy, I do not completely understand how the IGMP Proxy service should be behaving when configured correctly... and especially with multiple devices / additional Virtual IP assigned. Hi, I'll re-write my query and hopefully someone can put me in the right direction... Basically I am wanting to know if there is any documentation or notes available regarding the behavior of the IGMP Proxy protocol which is found in pfsense (query timings, priority etc.) . Specifically when two devices are running IGMP Proxy on the same LAN, but even any pointers to more in-depth documentation as to how this service runs on a stand alone box, would be appreciated. Thank you