New Firewall Status!

So a couple weeks ago I wrote about the new firewall setup.

Quick update on the status of that.  I built it out.  Got it working.  yay!

294989But I want more cool stuff.  So I have a business class fiber line run to the house with 5 static IP’s.  So I decided to see if I could get pfsense to do failover router.  You know, because why not.  I tried to get pfsense to install on this old thin client I had.  No go.  WAY TOO OLD!!!

So I moved on.  I too my esxi box and with the second nic ran it to another small unused switch of mine.  I then configured esxi with a second virtual switch that uses that NIC on the new physical switch.  I know, I could do that with vlans.  Duh!  But I am waiting for a cable for my switch so I can configure said vlans.

vSphere ClientSo with this new physical port I was able to build a pfsense box in my virtual environment.  I configured it with dual nics, 1 in each switch.  As you can see here.   My routers are named voot1 and voot2.  Named after the voot runner from the show Invader Zim.   My main network scheme is based on characters and vehicles from this show.

So now I have a physical router configured with one of my public ip’s   x.x.x.253.  Internal its configure as x.x.x.2.  I then configured my CARP ips.  You create a virtual IP for both lan and wan.   External is x.x.x.250, internal is x.x.x.1.

pfsense - New Page (1)

Set the outbound nat to use the .250 address and we are golden.  Setup all the carp sync settings to push the settings to the backup pfsense.  This works BEAUTIFULLY.   I was so amazed as how easy it is.  I just make a change pretty much anywhere in the main router and its automatically sync’d to the backup.

Once the backup is sync’d it’s time to test.   Reboot the primary.  Network dropped and didn’t come back up until the primary fully booted…

stewiegriffin-familyguy

Ok.  I got it.  The arp change caused some problems with the esxi side.  There is a switch security feature that blocked it.  You have to set the switch to accept promiscuous mode….. $%^& I think my switch is a slut.samantha_jones_promiscuitypromiscuous

 

Ok.  So now that my switch is acknowledged as a slut, it works.  Reboot primary router and the backup comes online, takes over the gateway x.x.x.1 and the external x.x.x.250.  This is awesome for various servers that I have in different datacenters that have ip security configured.

So this all went great, but the original reason for the upgrade was my old hardware choked itself out with my ipsec tunnel to AJ doing the encryption/decryption.  So we need to get the tunnel back up.   We got some time over this weekend to get the tunnel working.  We now copy back and forth at 30mbps.  30!!!!!   Fully maxing my fiber line over a secured tunnel and my cpu was only at 25%.  WIN!!!

 

BUT!!!!!! We have this awesome failover working…. will the tunnel come up on the backup too?   *checks the backup router* well the ipsec tunnel config was sync’d.  So what happens if I reboot the primary now….

NO EFFING WAY!!!!!  My tunnel re-establishes to AJ on the backup router too!!! HAHAHAHA this is awesome.

So Aj had asked me about a raspberry pi project on friday called pi-hole.  From the website..

“The Pi-hole is an advertising-aware DNS server that prevents ads from being downloaded. Once installed, configure your router to have DHCP clients use the Pi as their DNS server and then any device that connects to your network will have ads blocked without any further configuration. Alternatively, you can manually set each device to use the Raspberry Pi as its DNS server.”

But it seems like something that screams virtual machine.  I didn’t want to tie up a raspberry pi just for dns.  Turns out pi-hole doesn’t require pi hardware.  So it is possible to put in a vm.  So I configure a tiny ubuntu server and install pi-hole.

curl -L install.pi-hole.net | bash

Very simple.  But it works.  So I build out the vm.  Export it as an ovf and ship it off to AJ over the new tunnel.  He brings it up in his virtual environment and gets it working on his end.  Now to update our respective DHCP servers to tell our networks to use the new adblocking dns.   But… what if it’s down.  Ads/banners coub-1137363

There is a tunnel…. use each others as a backup!!!  Beautiful.

No my pi-hole is the primary on my network, AJ’s is secondary, and if both are down for some reason the network defaults to google.  services_ DHCP server

How well does pi-hole work?  Why do I keep saying pi-hole?  It sounds dirty.

pi-hole pi-hole pi-hole pi-hole pi-hole pi-hole pi-hole pi-hole

Yep.  Still sounds dirty.  But I got distracted.

Pi-hole Admin Console

That is insane…. 1726 ad’s blocked today.  We were gone for 4 hours and it’s still that high.  Crazy.  But you should see some sites without their ad’s.   Interesting.

This week/weekend has been pretty cool for getting some network stuff done.

 

New Firewall Build

So I have been running my home network on a home built router for well over a decade now.    Many moons ago when I lived in my apartment a client of mine was working on converting Eckerds to CVS stores.   As part of said conversion he had a ton of this little MaxTerm thin client machines.

3759951495_91064ca6e9

Which was not bad at all.  It has a little bit of memory, enough cpu to run as a router and an expansion slot.   Throw an extra network card in there and there you go.  Next to no power router.  I have been running http://m0n0.ch/wall/index.php since the beginning.  M0n0wall is now a dead project.  It will be missed, it sparked some of the great pieces I use today.   pfsense, freenas ect.   I have the last version on my little thin client and it runs well.

geek-is-coolBut like everything, eventually you run into something that makes you move on.  I had this recently.  Remember the great data apocalypse of 2015?  Well, that has sparked many changes in my backup replication plans.  One being that a buddy of mine and I are building secondary NAS systems for our freenas to put in each others server racks.  Yes, my buddy is a geek too.  So as part of this secondary nas setup.  We are going to be doing replication across the WAN.  Even though it uses SSH communication to do the replication.  We both felt doing an encrypted tunnel between locations was better.  Plus would let use gain access to each others resources without having to open unnecessary ports.  So we setup a nice encrypted tunnel.  Time to test some transfers…..

150kbs a second……..What-Meme-13

Now I never said I was a smart man.  But there is something wrong there.   AJ’s wan is 150/150 MEG!!!! (thank you FIOS) and mine is 50/50 also on FIOS!!!

No no no.  No sir, I do not want another.  I want the one I originally asked for!!!!!

Who broke that chair!!?
images

Ok.  I am calm now.  WTH is going on.   Checks the traffic graphs…

That’s not it.

Checks CPU graph on thin client….
hell-fire-1

Stops file transfer and checks again….
i_call_upon_the_power_of_ice_and_snow_by_fromzerotohero-d60aqs9

What the hell!?!  Now who broke THAT chair!!!!??

4565396395_c89b9c22f3_b

So it would seem that doing the encryption is causing a problem.  The cpu is just choking on the encrypt/decrypt over the tunnel.  That kind of sucks.  However we are also running on an old piece of hardware (12 years old?) and running on and EOL firmware.  Ok.  New Router time.

So this weekend I begin working on my new pfsense router.

Using this Intel D2500CCE Atom D2500 Dual LAN motherboard.

51mMt8cv6CL

Amazon

With a 2 gig memory chip this is ready to go.

I will post an update after I have this in and running for awhile and testing the encrypted transfers.  To see if it really is all in the cpu.