Scott Ullrich wrote:
On 2/25/06, Daniel Leaberry <[EMAIL PROTECTED]> wrote:

Thanks Scott for the Carp and OpenVPN answer. I have just one more.

I have a /29 that I run pfsense in and a /27 subnet of dmz addresses that is 
routed to me. I setup incoming load balancing with one of these /27 addresses. 
It didn't work. I wasn't sure if creating the virtual server with the dmz 
address also created a virtual ip, so I tried both. Neither one worked. I did 
set a firewall rule to allow the traffic. I looked at the output of 
/tmp/rules.debug and it didn't look like there was anything but an anchor.

I'm using the 2-20 testing snapshot

here's the relevant rules.debug output

# Load balancing anchor - slbd updates
rdr-anchor "slb"
rdr on fxp2 proto tcp from any to any port 21 -> 127.0.0.1 port 8021
rdr on fxp1 proto tcp from any to any port 21 -> 127.0.0.1 port 8022
rdr on xl0 proto tcp from any to any port 21 -> 127.0.0.1 port 8023


Did you create a Pool and a Virtual Server? You need VIP's, too. http://wiki.pfsense.com/wikka.php?wakka=IncomingLoadBalancing may
help.

I did, I followed that exact tutorial. I have 64.90.194.xx as a vip with proxy arp (even though my subnet is routed to me) and it's also the virtual server (The monitor option was pretty vague, I just picked icmp and put in the ip of one of the pool servers) It has a pool containing 3 servers in the lan subnet 192.168.x.x. It has appropriate pass rules for the wan (pass on wan port 80 to 64.90.194.xx) and I turned on logging so I can see my attempts getting to pfsense and being logged. The connection always times out. (I send a SYN and get nothing back.) When I check the state table on pf I see the following

tcp     67.104.0.xx:3185 -> 64.90.194.xx:80          SYN_SENT:CLOSED
tcp     64.90.194.xx:80 <- 67.104.0.xx:3185  CLOSED:SYN_SENT





The other question has to do with reflection redirects. If I read correctly 
these should let me access my public dmz addresses from the lan interface? If 
this is correct then these don't work. But they are the least of my concerns as 
I've traditionally used split dns. Here's an example reflection rule from 
rules.debug.

rdr on fxp0 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 192.168.xx.xx 
port 80
# Reflection redirects
rdr on fxp2 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 127.0.0.1 port 
19003
rdr on fxp1 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 127.0.0.1 port 
19004
rdr on xl0 proto tcp from any to xx.xx.xxx.xx/32 port { 80 } -> 127.0.0.1 port 
19005

I do have to say I've put two pfsense nodes into production using failover carp 
and it's much nicer then the netscreen we were using. The thing that killed the 
netscreen was it's inability to delete 1:1 mappings until the server using that 
ip was down for hours. Then the netscreen would notice it was down and let you 
delete the mapping. With pfsense it's been so much easier.


What doesn't work about it?  This is a hot item that I need to get
fixed and subsequently get paid for, since someone sponsored the
feature and they claim its broken, too, but it works for me.

Scott

Remember, everything I do is run through a 1:1 nat so maybe I'm a little different but from the lan interface I cannot access a server with a public ip. I type 64.90.195.xx (the main web server) and from inside the lan this does not give me anything but a connection timed out error.

Once again the states are as follows
tcp 192.168.100.103:2050 -> 64.90.193.xx:53101 -> 64.90.195.xx:80 SYN_SENT:CLOSED
tcp     64.90.195.xx:80 <- 192.168.100.103:2050      CLOSED:SYN_SENT

It looks like the redirect happens but it doesn't go through the 1:1 nat.

I tried a wide open rule on the lan (pass from any to any) and also tried unchecking the block private network option on the wan (I thought maybe it was blocking those redirect rules.)

Just to describe the network I have two subnets routed to me from my colo. the /29 is what pf is running on and the /27 is my dmz that I 1:1 nat with. So I only have two interfaces Wan and Lan.

Hope that helps

Daniel

Reply via email to