Dual firewalls, dual wan, carp - only one wan failing over properly
-
Can you show an example from /tmp/rules.debug of what you mean?
-
sure, here ya go:
# System Aliases loopback = "{ lo0 }" lan = "{ bge1 carp3 }" wan = "{ em2 carp2 }" TELCOVE = "{ em1 }" DMZ = "{ em0 }" PFSYNC = "{ em3 }" BACKUPS = "{ bge0 }"
TELCOVE is my 2nd wan (opt1).
lan/wan/TELCOVE/DMZ are all setup the same way: each interface has a real ip and a shared carp interface/ip as well. for whatever reason, only lan/wan carps are being included in the macros (above). that, coupled with the rules shown below, result in inconsistent nat results:
nat on $wan from 172.16.0.0/12 to any -> 208.x.x.137/32 nat on $wan from 10.0.0.0/24 to any -> 208.x.x.137/32 nat on $wan from 192.168.0.0/16 to any -> 208.x.x.137/32 nat on $wan from 192.192.192.0/24 to any -> 208.x.x.137/32 nat on $TELCOVE from 172.16.0.0/12 to any -> 72.x.x.13/32 nat on $TELCOVE from 10.0.0.0/24 to any -> 72.x.x.13/32 nat on $TELCOVE from 192.168.0.0/16 to any -> 72.x.x.13/32 nat on $TELCOVE from 192.192.192.0/24 to any -> 72.x.x.13/32
and here are the results:
# pfctl -s nat|grep carp nat on carp2 inet from 172.16.0.0/12 to any -> 208.x.x.137 nat on carp2 inet from 10.0.0.0/24 to any -> 208.x.x.137 nat on carp2 inet from 192.168.0.0/16 to any -> 208.x.x.137 nat on carp2 inet from 192.192.192.0/24 to any -> 208.x.x.137
i believe the missing carp/72.x nats may be to blame for the broken firewall failover, because failover works perfectly for conversations routed through 208(wan) yet breaks for conversations routed through 72(TELCOVE).
-
Oh my! Good call :o
I'll get this fixed shortly.
-
Oh my! Good call :o
I'll get this fixed shortly.
do you agree that this may be what's breaking the failover?
based on the fact that i've seen other people documenting how to get this done, i'm surprised it hasn't been brought up before. but hey, pfsense already rocks and i'm looking forward to deploying it at more customer sites.
thanks for your hard work. just let us know how to get the fix onto our systems. :)
-
Use edit.php (Diagnostics -> Edit File) and load /etc/inc/filter.inc
Now replace the file contents with : http://www.pfsense.com/~sullrich/filter.inc
Finally, from a command prompt run, /etc/rc.filter_configure
Does /tmp/rules.debug look better now?
NOTE: filter.inc updated at 4:28PM EST
-
Does /tmp/rules.debug look better now?
without a doubt. :)
unfortunately, failover is still not working properly. i'll debug a bit more and post here if/when i find anything else. thanks for such a quick response.
-
still hunting for a reason why failver is partially broken between my two firewalls, i found another possible discrepancy between the ways different interfaces are handled. there may be a checkbox somewhere i've missed, so please point it out if that's the case. what i've found is suspect for two reasons: 1) they are auto-generated and 2) they differ between WAN and OPT1 (my 2nd wan) interfaces … remember that WAN fails over properly but OPT1 does not ...
block drop in on ! bge1 inet from 10.0.0.0/24 to any
block drop in on bge1 inet6 from fe80::217:a4ff:fe3f:f53c to any
block drop in inet from 10.0.0.59 to any
block drop in on ! em1 inet from 72.x.x.0/24 to any
block drop in on em1 inet6 from fe80::x.x.x.x to any
block drop in inet from 72.x.x.11 to any
block drop in on ! em0 inet from 10.0.6.0/24 to any
block drop in on em0 inet6 from fe80::20e:cff:feb7:fabc to any
block drop in inet from 10.0.6.251 to any
block drop in on ! em3 inet from 172.31.255.248/29 to any
block drop in inet from 172.31.255.249 to any
block drop in on em3 inet6 from fe80::20e:cff:feb7:fabf to any
block drop in on ! bge0 inet from 10.0.2.0/24 to any
block drop in inet from 10.0.2.59 to any
block drop in on bge0 inet6 from fe80::217:a4ff:fe3f:f53d to anyi see BLOCK/DROP rules here, none of which are being logged. i do understand why they are there and what they are trying to protect against. what i noticed as being odd was that WAN (em2) is not represented here, whereas OPT1 (em1) is. so naturally i have to wonder if packets are getting dropped at OPT1 and not on WAN, thus breaking failover on OPT1 but not on WAN. but since logs are not being generated i can't tell for sure.
anybody want to comment? i'm still searching for the failover problem, so any constructive input would be greatly appreciated.
-
Make sure you are on the latest version http://www.pfsense.com/~sullrich/1.0-SNAPSHOT-09-26-06/
-
Make sure you are on the latest version http://www.pfsense.com/~sullrich/1.0-SNAPSHOT-09-26-06/
ahh, zero-day-old warez. doesn't get any better than that. :) lemme push the update and see what happens.
-
i see BLOCK/DROP rules here, none of which are being logged. i do understand why they are there and what they are trying to protect against. what i noticed as being odd was that WAN (em2) is not represented here, whereas OPT1 (em1) is. so naturally i have to wonder if packets are getting dropped at OPT1 and not on WAN, thus breaking failover on OPT1 but not on WAN. but since logs are not being generated i can't tell for sure.
updated to the new snapshot, still have the same situation and therefore the same question.