• 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • All
  • Data Center
  • Enterprise
  • Fail Over
  • High Availablilty
  • Home
  • Load Balancing
  • Medium Enterprise
  • Small
  • SME
  • Default
  • Title
  • Date
  • Random
  • Netgate® SG-1000 微型下一代防火墙,是一种经济高效的, 最新 pfSense® 微型安全网关设备, 理想的个人 VPN 防火墙。 带有双
    • Home
    • Small
  • Netgate 1100, 原装 pfSense plus OS,具有世界一流的最佳性价比,精美和无与伦比的低价。 功能强大且节能,高效的 64位 Marvell ARMADA®3720
    • Home
    • Small
  • Netgate 2100 美观大方,物超所值 Netgate 2100 安全网关设备与 pfSense 软件在该级别提供了无与伦比的性能和灵活性。对于需要更多计算资源来支持使用多个 pfSense 附加包和
    • SME
  • Netgate® 4200、4G DDR5 RAM、16G 存储。 pfSense Plus 软件是同类产品中功能最齐全的安全网关。 Netgate 4200
    • SME
  • Netgate® 4200、4G DDR5 RAM、128G M.2 存储。 pfSense Plus 软件是同类产品中功能最齐全的安全网关。 Netgate
    • SME
  • Netgate 6100 设备可配置为安全设备防火墙,LAN 或 WAN 路由器,VPN 设备,DHCP 服务器,DNS 服务器和 IDS
    • Medium Enterprise
    • SME
  • Netgate 6100 MAX 设备可配置为安全设备防火墙,LAN 或 WAN 路由器,VPN 设备,DHCP 服务器,DNS 服务器和
    • Medium Enterprise
    • SME
  • Netgate® 8200 是同类产品中最通用的安全网关之一。适用于需要灵活配置端口以实现高速广域网和局域网连接的中小企业、大型企业、IDC 数据中心。 Netgate 8200 结合了 Intel® Atom® C3758R
    • Data Center
    • Enterprise
    • Medium Enterprise
  • 1G, 2.5G, 10G, 25G, 100G WAN ... Netgate® 8300 体验无与伦比的价值和性能,由 pfSense®
    • Data Center
    • Enterprise
load more / hold SHIFT key to load all load all

Components of a High Availability Cluster

Though often erroneously called a “CARP Cluster”, two or more redundant pfSense firewalls are more aptly titled a “High Availability Cluster”, since CARP is only one of several technologies used to achieve High Availability with pfSense.

The most common High Availability cluster configuration includes only two nodes. It is possible to have more nodes in a cluster, but they do not provide a significant advantage. This guide assumes two SG-4860 nodes are in use, one acting as the primary node and the other as the secondary node.

../../_images/diagram-ha-example.png

Example High Availability Cluster

IP Address Redundancy (CARP)

For connectivity through a cluster to continue seamlessly during failover, traffic to and from the cluster must use redundant IP addresses. In pfSense, Common Address Redundancy Protocol (CARP) is used for this task.

A CARP type Virtual IP address (VIP) is shared between nodes of a cluster. One node is master and receives traffic for the IP address, and the other nodes maintain backup status and monitor for heartbeats to see if they need to assume the master role if the previous master fails. Since only one member of the cluster at a time is using the IP address, there is no IP address conflict for CARP VIPs.

In order for failover to work properly it is important that inbound traffic coming to the cluster (routed upstream traffic, VPNs, NAT, local client gateway, DNS requests, etc) be sent to a CARP VIP and for outgoing traffic such as Outbound NAT to be sent from a CARP VIP. If traffic is addressed to a node directly and not a CARP VIP, then that traffic will not be picked up by other nodes.

CARP works similar to VRRP and HSRP, and may even conflict in some cases. Heartbeats are sent out on each interface containing a CARP VIP, one heartbeat per VIP per interface. At the default values for skew and base, a VIP sends out heartbeats about once per second. The skew determines which node is master at a given point in time. Whichever node transmits heartbeats the fastest assumes the master role. A higher skew value causes heartbeats to be transmitted with more delay, so a node with a lower skew will be the master unless a network or other issue causes the heartbeats to be delayed or lost.

Note

Never access the firewall GUI, SSH, or other management mechanism using a CARP VIP. For management purposes, only use the actual IP address on the interface and not the VIP. Otherwise it cannot be determined beforehand which unit is being accessed.

Configuration Synchronization (XMLRPC)

To make the job of maintaining two practically identical firewall nodes easier, configuration synchronization is possible using XMLRPC. Some areas cannot be synchronized, such as the Interface configuration, but many other areas can: Firewall rules, aliases, users, certificates, VPNs, DHCP, routes, gateways, and more. As a general rule, items specific to hardware or a particular installation, such as Interfaces or values under System > General or System > Advanced do not synchronize. For a list of areas that will synchronize, see the checkbox items on System > High Avail Sync in the XMLRPC section. Most packages will not synchronize but some contain their own synchronization settings. Consult package documentation for more details.

When XMLRPC Synchronization is enabled, settings from supported areas are copied to the secondary and activated after each configuration change.

XMLRPC Synchronization is optional, but maintaining a cluster is a lot more work without it.

State Table Synchronization (pfsync)

Active connection state information is exchanged between nodes using the pfsync protocol to achieve seamless failover. When pfsync is active and properly configured, all nodes will have knowledge of each connection flowing through the cluster. If the master node fails, the backup node will take over and clients will not notice the transition since both nodes knew about the connection beforehand.

Failover can still operate without pfsync, but it will not be seamless. Without pfsync if a node fails and another takes over, user connections would be dropped. Users may immediately reconnect through the other node, but they would be disrupted during the transition.