Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?

    Scheduled Pinned Locked Moved HA/CARP/VIPs
    40 Posts 4 Posters 6.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Sergei_ShablovskyS
      Sergei_Shablovsky @bmeeks
      last edited by Sergei_Shablovsky

      @bmeeks said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

      Follow-up Caveat: Suricata cannot analyze encrypted traffic. Since nearly 90% or more of traffic on the Internet these days is encrypted, Suricata is blind to a lot of what crosses the perimeter link. You can configure fancy proxy servers to implement MITM (man-in-the-middle) interception and decryption/re-encryption of such traffic, but that carries its own set of issues. Depending on what you are hoping to scan for, it could be that putting the security emphasis on the endpoints (workstations and servers) instead of the perimeter (firewall) is a much better strategy with a higher chance of successfully intercepting bad stuff.

      At the first let me say BIGGEST THANKS FOR SO DETAILED ANSWERING and passion to help me resolving the case.

      So, because SSL/TLS1.3 connections become standard by default in most common used desktop and mobile browsers (and even search systems exclude sites w/o SSL from their ranking and search results) and QUIC at all become more and more popular on all server OSs and web-servers,- is that mean that EOL date for IDS/IPS w/o mitm come close and close? And not only for outside incoming traffic.
      Even inside of organisation’s security perimeter would be no place for Suricata/Snort.

      And only what Security Admin may doing would be:

      • fresh updates for applications and OSs;
      • planning internal infrastructure and intrusion monitoring well;
      • extensively using AI for monitoring hardware and apps, anomalies real-time finding (and alerting);
      • creating great firewall’s rules;

      Glad to read Your opinion about that.

      —
      CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
      Help Ukraine to resist, save civilians people’s lives !
      (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        In a large organisation though they may force all traffic through a proxy to decrypt it. In which case it could still be scanned.

        Sergei_ShablovskyS 2 Replies Last reply Reply Quote 0
        • Sergei_ShablovskyS
          Sergei_Shablovsky @stephenw10
          last edited by Sergei_Shablovsky

          @stephenw10 said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

          In a large organisation though they may force all traffic through a proxy to decrypt it. In which case it could still be scanned.

          But this mean at least 2 (HA, active-backup) IDS/IPS servers on each (!) LAN. So totally 2 proxy + 2 IDS/IPS + several switches on each of LANs.

          —
          CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
          Help Ukraine to resist, save civilians people’s lives !
          (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Wouldn't really need more than one pair IMO. As long as all subnets have access to the proxy.

            1 Reply Last reply Reply Quote 1
            • Sergei_ShablovskyS
              Sergei_Shablovsky
              last edited by

              By the way, Gigamon’s TAPs and Packets Brokers looks VERY PROMISING to mirroring all traffic for future inspections…

              —
              CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
              Help Ukraine to resist, save civilians people’s lives !
              (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

              1 Reply Last reply Reply Quote 0
              • Sergei_ShablovskyS
                Sergei_Shablovsky @mcury
                last edited by Sergei_Shablovsky

                @mcury said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                @Sergei_Shablovsky

                783db992-7054-49e9-a0b5-a64d5976480f-image.png

                You will need to connect each firewall to each ISP's router.
                This setup uses a single switch but you could use two with VRRP enabled if that is what you want.
                This setup is using a LACP to the switches, but you could change that to use the 10G switch you mentioned.

                Is that possible to use LACP also for CARP SYNC, if I have 2 interfaces of NICs for this purpose?

                And what about using LACP from firewalls to upstream switches (igb2 - igb5) ?

                P.S.
                Sorry for late reply.
                And THANK YOU SO MUCH for networking passion and patience!

                —
                CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                Help Ukraine to resist, save civilians people’s lives !
                (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                stephenw10S M 2 Replies Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator @Sergei_Shablovsky
                  last edited by

                  @Sergei_Shablovsky said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                  Is that possible to use LACP also for CARP SYNC, if I have 2 interfaces of NICs for this purpose?

                  You mean to use two links in a lagg for just the pfsync traffic? Yes, you can do that but it's probably not worth it IMO. 😉

                  1 Reply Last reply Reply Quote 1
                  • M
                    mcury Rebel Alliance @Sergei_Shablovsky
                    last edited by mcury

                    @Sergei_Shablovsky said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                    Is that possible to use LACP also for CARP SYNC, if I have 2 interfaces of NICs for this purpose?

                    I don't think it is necessary, the SYNC interface doesn't use that much of traffic, as far as I'm concerned, firewall states and configuration changes only (If I'm wrong about this, please someone correct me).

                    And what about using LACP from firewalls to upstream switches (igb2 - igb5) ?

                    That would help only if your internet link is above 1Gbps. Although a single client would never go beyond 1Gbps anyway.
                    That setup above is considering intervlan traffic along with 1Gbps internet links, to don't bottleneck anything.

                    Another approach would be to update all the NICs in the computers to 2.5Gbps, get 2.5Gbps switches with 10Gbps uplink ports to the firewall, then connect the NAS to another 10Gbps port, use the remaining 2.5Gbps ports to connect to the ISP routers/gateways, if those have 2.5Gbps.
                    By doing like this, a single client would be able to reach 2.5gbps to the WAN.
                    You could also do LACP with 2.5Gbps ports.

                    And THANK YOU SO MUCH for networking passion and patience!

                    :) My pleasure

                    dead on arrival, nowhere to be found.

                    Sergei_ShablovskyS 1 Reply Last reply Reply Quote 1
                    • Sergei_ShablovskyS
                      Sergei_Shablovsky @mcury
                      last edited by Sergei_Shablovsky

                      @mcury said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                      @Sergei_Shablovsky said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                      Is that possible to use LACP also for CARP SYNC, if I have 2 interfaces of NICs for this purpose?

                      I don't think it is necessary, the SYNC interface doesn't use that much of traffic, as far as I'm concerned, firewall states and configuration changes only (If I'm wrong about this, please someone correct me).

                      My FIRST MAIN GOAL IS TO MAKE HARDWARE RESERVATION for all hardware links:

                      • between pfSense boxes and switches that connected to it;
                      • between pfSense boxes itself;

                      So the main “guide mantra” now: AVAILABILITY - FIRST, SECURITY - second, OBSERVABILITY (MONITORING & ALERTTING) - third.

                      And what about using LACP from firewalls to upstream switches (igb2 - igb5) ?

                      That would help only if your internet link is above 1Gbps. Although a single client would never go beyond 1Gbps anyway.
                      That setup above is considering intervlan traffic along with 1Gbps internet links, to don't bottleneck anything.

                      The pfSense itself connected to the nets by switches. So, for example, when offices nodes generate <1G at all, the web services generate between 3 and 7G depending on daytime.

                      So, the hardware doubled connection from pfSense to upstream switch (which directly connected to ISP’s aggregate switch) was not only as availability, but increase bandwidth.

                      Am I lost logic somewhere? ;)

                      Another approach would be to update all the NICs in the computers to 2.5Gbps, get 2.5Gbps switches with 10Gbps uplink ports to the firewall, then connect the NAS to another 10Gbps port, use the remaining 2.5Gbps ports to connect to the ISP routers/gateways, if those have 2.5Gbps.
                      By doing like this, a single client would be able to reach 2.5gbps to the WAN.
                      You could also do LACP with 2.5Gbps ports.

                      Yes, the next step in upgrading would be replacing existed downstream NIC’s on pfSense server to 10G-heads NICs and upstream NICs - to 40G or 20G-head NICs.

                      Am I looking at right direction? :)

                      —
                      CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                      Help Ukraine to resist, save civilians people’s lives !
                      (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        mcury Rebel Alliance @Sergei_Shablovsky
                        last edited by

                        @Sergei_Shablovsky I used to configure VRRP with Cisco Switches, Catalyst.
                        Something around 15 years ago, more or less, not sure anymore..

                        I'm getting really old hehe, that is not good..

                        Check if you can find VRRP switches, that supports 802.1ad (LACP), and go ahead, build the dream network :)

                        dead on arrival, nowhere to be found.

                        1 Reply Last reply Reply Quote 0
                        • Sergei_ShablovskyS
                          Sergei_Shablovsky @stephenw10
                          last edited by

                          @stephenw10 said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                          In a large organisation though they may force all traffic through a proxy to decrypt it. In which case it could still be scanned.

                          Even with 1k nodes in one branch, the inspecting of all incoming traffic would be challenge even for latest&greatest Intel CPU + Intel QAT, and in case client-server tunneling - not give us ability to inspect traffic between them at all.

                          In any case, decryption to inspect traffic - definitely is a very bad idea to implement exactly on border firewall: firewall need to take decisions very quickly, “on the fly”, and waiting the decryption results - is not possible, because shaping overall bandwidth in 10-15 times.

                          —
                          CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                          Help Ukraine to resist, save civilians people’s lives !
                          (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                          1 Reply Last reply Reply Quote 0
                          • Sergei_ShablovskyS
                            Sergei_Shablovsky @stephenw10
                            last edited by

                            @stephenw10 said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                            Well there's no way to pass firewall blocks from something external if you're using it in IPS mode. At least not yet.

                            In IDS mode though you can just mirror the traffic to something external for analysis.

                            What about scheme, let’s call it “part of multi-layer defense strategy”

                            there are IDS/IPS system on separate server, that receives mirrored traffic from all of 4xWANs from switches above the pfSense-based firewall
                            2.
                            after some ACLs in IDS/IPS triggered and IDS/IPS adding IPs to blacklist
                            3.
                            some crone script on IDS/IPS server adding all banned/blacklisted IPs to the switches ACL’s

                            In this scheme we have constantly worked “traffic analyzing loop” which just detecting and blocking bad/potentially bad requests from coming to border pfSense-based firewall.
                            And taking off some loading from pfSense-based server’s hardware.

                            As fast example, this may be a guard from small DOS/DDOS or flooding attacks.

                            What is Your opinion on this?

                            —
                            CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                            Help Ukraine to resist, save civilians people’s lives !
                            (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              That could work. It's unlikely to help much with a DOS/DDOS attack though because by the time that traffic hits the ACLs on a switch it's already used up bandwidth on the WAN.

                              Sergei_ShablovskyS 1 Reply Last reply Reply Quote 1
                              • Sergei_ShablovskyS
                                Sergei_Shablovsky @stephenw10
                                last edited by Sergei_Shablovsky

                                @stephenw10 said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                                That could work. It's unlikely to help much with a DOS/DDOS attack though because by the time that traffic hits the ACLs on a switch it's already used up bandwidth on the WAN.

                                Thank You for answering and “network firewalling passion” :)

                                Agree, even in middle-size (mean 200-300 Gb/s) DDoS attack, no one edge FW/switch guard You from filling up Your 10Gb uplink to ISP: after incoming rate raising 9,7-10,3Gb/s (or some quantities of pps) automated alerting system just temporarily dev/null anything that going to You from outside.

                                But I asking about some kind of eliminating loading on edge FW: moving some portion of blocking rulesets from edge FT to uplink switches (especially they are great built on ASICs).

                                Anyway, Intel-based consumer servers with FreeBSD/RHEL able to crunching only up to 50-100Gbps depend on CPUs and RAM/PCIe speed, offloading scheme with DPDK - add extra 200-300Gbps to this, offloading scheme with Smart-NICs - give us another extra, than specialized NPU with custom silicon, etc…
                                This mean pfSense - up to 50-100 Gbps, TNSR - up to 400. (But in real life on non-synthetic tests the numbers would be like 60 and 200 respectively).

                                So, each 1Gb which would be dropped/rejected on uplink ASIC-based switch - would be VERY helpful.

                                Where am I wrong?

                                —
                                CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                Help Ukraine to resist, save civilians people’s lives !
                                (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Well it would remove load from the firewall. So if you were under a DDoS attack and needed to still route between internal subnets that could be useful. But it wouldn't help with the attack itself much.

                                  Sergei_ShablovskyS 1 Reply Last reply Reply Quote 1
                                  • Sergei_ShablovskyS
                                    Sergei_Shablovsky @stephenw10
                                    last edited by Sergei_Shablovsky

                                    @stephenw10 said in How to make HA on 2 pfSense on bare metal WITH 4 x UPLINKS WANs ?:

                                    Well it would remove load from the firewall. So if you were under a DDoS attack and needed to still route between internal subnets that could be useful. But it wouldn't help with the attack itself much.

                                    Agree! Anyway for middle/big DDoS better to deal on local ISPs + CloudFlare level. Here no room for edge FW… :)

                                    Let me to note, if thinking in “Zero thrust” direction, also FW on end local node/service as “fine tuning firewalling” would be great, because each end node better know what particular (and how) need to be secured.

                                    So at the end we build 3-layered (as minimum) defense:

                                    1. ACLs on edge ASIC-based switches;
                                    2. pfSense as edge FW;
                                    3. PF/IPF/IPFW FW (sertificates, tokens, etc…) on end node/service;

                                    What do You think about this 3-layered scheme, @stephenw10 ?

                                    —
                                    CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                    Help Ukraine to resist, save civilians people’s lives !
                                    (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.