Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Secondary WAN and High Availability

    Scheduled Pinned Locked Moved Routing and Multi WAN
    10 Posts 3 Posters 1.2k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      bp81
      last edited by

      I am in the process of trying to select equipment for a conversion of our router/firewall appliances to Netgate. I want to position myself so that we can add secondary WAN and high availability at a later time.

      My read is that secondary WAN + High Availability would make it necessary to have four interfaces. 2x WAN, 1x LAN, 1x HA Sync.

      One of the appliances we are looking at for some of our smaller locations is the SG-3100, which has three interfaces: WAN, OPT1, and a LAN interface with a 4 port integrated switch. Obviously, I'm an interface short. My question is, can I define a vlan solely for HA sync and attach it to one of the switch ports of the LAN interface on an SG-3100 and still achieve my end goals?

      V S 2 Replies Last reply Reply Quote 0
      • V Offline
        viragomann @bp81
        last edited by

        @bp81 said in Secondary WAN and High Availability:

        My read is that secondary WAN + High Availability would make it necessary to have four interfaces. 2x WAN, 1x LAN, 1x HA Sync.

        I'm wondering, where you got this from.
        HA or CARP has nothing to do with the number of interfaces. However, it's recommended to use a separate interface for sync when syncing states.

        But each interface has to have a unique IP + the shared CARP VIP. So you should have at least 3 public WAN IPs for running CARP HA.

        B 1 Reply Last reply Reply Quote 0
        • S Offline
          SteveITS Rebel Alliance @bp81
          last edited by

          @bp81 Yes you can make a port a discrete port...see https://docs.netgate.com/pfsense/en/latest/solutions/sg-3100/switch-overview.html

          Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
          Upvote 👍 helpful posts!

          1 Reply Last reply Reply Quote 0
          • B Offline
            bp81 @viragomann
            last edited by

            @viragomann said in Secondary WAN and High Availability:

            @bp81 said in Secondary WAN and High Availability:

            My read is that secondary WAN + High Availability would make it necessary to have four interfaces. 2x WAN, 1x LAN, 1x HA Sync.

            I'm wondering, where you got this from.
            HA or CARP has nothing to do with the number of interfaces. However, it's recommended to use a separate interface for sync when syncing states.

            But each interface has to have a unique IP + the shared CARP VIP. So you should have at least 3 public WAN IPs for running CARP HA.

            The three public WAN IPs are not an issue. Most of our locations already have more than that, and in the places we don't have them, getting them is a phone call and a minimal cost.

            I am basing my count of interfaces on the recommended configuration provided by Netgate's knowledge base. A router in HA configuration with two WAN connections will, by necessity, have two WAN interfaces. The device will, by necessity, have one LAN interface. While I understand you could run sync through a switch on your LAN technically, there are obvious reasons why a direct link between the primary and the backup for sync is the better configuration.

            I prefer better configurations.

            The ultimate point of this question is in reference to the ability of the SG3100 to accomodate this. It only has three physical interfaces, but the SG5100 and 6100, while they have the physical interfaces, are significant overkill for some of our smaller locations in terms of hardware performance. I'd prefer to economize on the less expensive units, IF they can work in a dual WAN + HA configuration as I described.

            V 1 Reply Last reply Reply Quote 0
            • V Offline
              viragomann @bp81
              last edited by

              @bp81 said in Secondary WAN and High Availability:

              I am basing my count of interfaces on the recommended configuration provided by Netgate's knowledge base. A router in HA configuration with two WAN connections will, by necessity, have two WAN interfaces.

              So do you have two different WAN connections on that location?

              While I understand you could run sync through a switch on your LAN technically, there are obvious reasons why a direct link between the primary and the backup for sync is the better configuration.

              Absolutely agree. As I mentioned, when you intend to sync states for full HA usage, you should use a separate interface.

              B 1 Reply Last reply Reply Quote 0
              • B Offline
                bp81 @viragomann
                last edited by

                @viragomann said in Secondary WAN and High Availability:

                @bp81 said in Secondary WAN and High Availability:

                I am basing my count of interfaces on the recommended configuration provided by Netgate's knowledge base. A router in HA configuration with two WAN connections will, by necessity, have two WAN interfaces.

                So do you have two different WAN connections on that location?

                While I understand you could run sync through a switch on your LAN technically, there are obvious reasons why a direct link between the primary and the backup for sync is the better configuration.

                Absolutely agree. As I mentioned, when you intend to sync states for full HA usage, you should use a separate interface.

                Yes, I have two separate WAN connections at the location in question, each with sufficient public IP addressing for an HA configuration.

                V 1 Reply Last reply Reply Quote 0
                • V Offline
                  viragomann @bp81
                  last edited by

                  @bp81 said in Secondary WAN and High Availability:

                  Yes, I have two separate WAN connections at the location in question, each with sufficient public IP addressing for an HA configuration.

                  So yes, then you need four interfaces. However, you can also use VLANs for the both WANs together with a VLAN-capable switch.
                  For running CARP on VLAN interfaces, you have to configure the VLAN interfaces on both nodes first and then add a CARP VIP on the master.

                  B 1 Reply Last reply Reply Quote 0
                  • B Offline
                    bp81 @viragomann
                    last edited by

                    @viragomann said in Secondary WAN and High Availability:

                    @bp81 said in Secondary WAN and High Availability:

                    Yes, I have two separate WAN connections at the location in question, each with sufficient public IP addressing for an HA configuration.

                    So yes, then you need four interfaces. However, you can also use VLANs for the both WANs together with a VLAN-capable switch.
                    For running CARP on VLAN interfaces, you have to configure the VLAN interfaces on both nodes first and then add a CARP VIP on the master.

                    Maybe I'm missing something, but are you suggesting that a vlan capable perimeter switch could be setup to serve both WANs across a single connection / single WAN interface on the router? If so, this would be outside anything I've tried to do but is interesting.

                    V 1 Reply Last reply Reply Quote 0
                    • V Offline
                      viragomann @bp81
                      last edited by

                      @bp81
                      Exactly. That is what VLANs are meant for, running multiple L2 networks on a single hardware.

                      B 1 Reply Last reply Reply Quote 0
                      • B Offline
                        bp81 @viragomann
                        last edited by

                        @viragomann said in Secondary WAN and High Availability:

                        @bp81
                        Exactly. That is what VLANs are meant for, running multiple L2 networks on a single hardware.

                        Yeah, I suppose that does make sense, it just never occurred to me to do it. I'm running an HA configuration now with a competing product using separate physical interfaces, but the router I'm using has 8 interfaces, so it's not as if I needed a vlan for this purpose to economize on limited interfaces either.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.