[MLUG] [ot] Looking for high performance open source firewall

Andy Pintar andy at hapoteh.net
Thu Dec 18 18:20:39 EST 2008


Yeah, you can have 2 firewalls between the ciscos and the switch and join 
them using pfsync.  It's a common setup, only problem is they can't be in 
bridge mode if he wants to run a tcp syn proxy.  Since he really wants 
bridge mode then that is out.
A reference is:
http://www.openbsd.org/faq/pf/carp.html#pfsyncintro

On Thu, 18 Dec 2008, Nicholas Accad wrote:

> Just a though, I am not really good at networking beyond the basic levels
> Can't you add a BSD firewall before the LVS? Let it deal with the SYN
> stuff, and let IPTables/Linux deal with the rest.
> I have no idea how doable is this though.
> -nick (petting his CheckPoint/IPSO combos)
>
> On Thu, Dec 18, 2008 at 9:36 AM, Emery Guevremont
> <emery.guevremont at gmail.com> wrote:
>>
>>
>> On Thu, Dec 18, 2008 at 8:32 AM, David Filion <david at filiontech.com> wrote:
>>>
>>> Just for the record, I had simplified things.  Our setup actually looks
>>> like:
>>>
>>>   FIBRE    FIBRE
>>>     ||       ||
>>>   CISCO----CISCO
>>>     \\     //
>>>      ||   //
>>>      SWITCH===OTHER STUFF ON SWITCH
>>>      //  \\
>>>     LB    LB
>>>     ||    ||
>>>     SWITCH(ES)
>>>     // || \\
>>>   S E R V E R S
>>>
>>>
>>> As Jen-Francois said, "Videotron doesn't allow you to terminate your
>>> loop into something that doesn't belong to them.  Their router is the
>>> demarc."  The routers belong to Videotron, I have no control over or
>>> access to them.  Only one fibre is active at a time, spanning tree is
>>> used to switch between them is one of the routers/fires fails.
>>
>> Spanning-tree is for running redundant switches btw. Helps prevents
>> switching loops and adds redundancy. The routers are probably using ibgp or
>> eigrp.
>>>
>>>
>>> My goal was to try and get a synproxy setup somewhere in front of the
>>> load balancers so that if a syn attacked occurred,  we'd be saving our
>>> servers behind the load balancers from getting overloaded with SYNs.
>>> So far, getting more servers, breaking TCPs timeout settings,  and/or
>>> replacing our Linux load balancers with a version of BSD seem to be the
>>> only solutions.
>>>
>>> Iptables is setup on the load balancers.  Iptables doesn't help because
>>> it lets the SYNs go right through to the servers because it doesn't know
>>> the incoming SYN is an invalid SYN.  The only thing it can provide it
>>> rate limiting, but that is not currently an option.
>>>
>>> Seems a "drop in" solution is not in my future.  Oh well.
>>>
>>> Thanks to all that answered/suggested.
>>>
>>> David
>>>
>>>
>>> Andy Pintar wrote:
>>>> I'd say that the solution has presented itself.  As far as I see it, you
>>>> only have to readdress your load balancers. If you have a big block of
>>>> IPs
>>>> you won't have to run NAT on your firewall.  I'm guessing it looks like
>>>> this:
>>>>
>>>>      FIBRE
>>>>        ||
>>>>      CISCO
>>>>        ||
>>>>      SWITCH===OTHER STUFF ON SWITCH
>>>>        ||
>>>>      LOAD BALANCER
>>>>      ||   ||   ||
>>>>          LVS
>>>>
>>>>
>>>> Why don't you hook up a firewall between the cisco and the switch, give
>>>> it
>>>> a public IP, and forget about it?  Sure you'll have to reconfig your
>>>> routing a bit but all traffic will *NOT* look like it came from a
>>>> private
>>>> IP space.  I mean, even in the basic home user NAT case where you have a
>>>> single dynamic IP, incoming traffic doesn't look like it's from inside
>>>> the
>>>> network.  So if you have a big enough IP space and don't need NAT
>>>> anyway,
>>>> then you won't need to run NAT with the firewall operational.  In this
>>>> case you can run any of the expensive ones (checkpoint) or just use PF
>>>> with the syn proxy on.
>>>>
>>>> Please anyone correct me if I've misunderstood/miscommunicated.
>>>> Thanks;
>>>> -Andy.
>>>>
>>>> On Wed, 17 Dec 2008, David Filion wrote:
>>>> ...
>>>>
>>>>> OK, I'll keep it simple.
>>>>>
>>>>> ISP's fibre comes into our server room.  It's connected to a Cisco 3xxx
>>>>> series router.  That router is plugged into a switch.  Also plugged
>>>>> into
>>>>> the switch in a load balancer running Linux+LVS.  The side of the
>>>>> router
>>>>> facing us is providing our live ips, it's not NATing.  I'm assuming the
>>>>> interface facing the ISP is a 10.0.0.0/8 or something similar.   This
>>>>> results in us being able to assign our live IPs to our load balancer(s)
>>>>> and other server as needed.
>>>>>
>>>> ...
>>>>
>>>>> I was just hoping to find something to filter out some of the garbage
>>>>> traffic before it hit our systems.  I didn't want to add an additional
>>>>> layer of NATing because to our web servers, everything would look like
>>>>> it came from an private IP space and not from the real client.
>>>>>
>>>> _______________________________________________
>>>> mlug mailing list
>>>> mlug at listserv.mlug.ca
>>>>
>>>> https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca
>>>>
>>>
>>> _______________________________________________
>>> mlug mailing list
>>> mlug at listserv.mlug.ca
>>> https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca
>>
>>
>> _______________________________________________
>> mlug mailing list
>> mlug at listserv.mlug.ca
>> https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca
>>
>>
> _______________________________________________
> mlug mailing list
> mlug at listserv.mlug.ca
> https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca
>


More information about the mlug mailing list