Re: Possibilities and performance of conntrackd, NATing cluster

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 09/23/08 05:05, icovnik wrote:
Now only to clarify that I understand it correctly:

Asymmetric setup: Any router receives any of packets. All routers have the same information about all connections in cluster, so it doesn't matter which of them handles which connection.

Symmetric setup: Once the connection is setup on RouterX, the whole connection should be handled by that very same router.

Is this correct?

Eh, close.

Symmetric is where all the traffic passes through the same firewall going both inbound and outbound, much like symmetric routes.

Where as asymmetric is where traffic passes through different firewalls going inbound and outbound, much like asymmetric routes.

As far as which firewalls know about the connection or not depends on how replication is set up. However the symmetric verses asymmetric firewalling still applies.

How is it possible to have only one firewall to handle packets in cluster? Is it like in the setup in the testcase (http://conntrack-tools.netfilter.org/testcase.html)? If I understand it correctly, it means to have only one active firewall/router and one passive waiting for failure. How is ti possible to scale to higher loads?

Active / passive does not scale. A/P is only meant for redundancy / protection against one node failing.

Hm this is interresting - split incoming/outgoing traffic to separate routers. Maybe the conntrackd can be used in this scenario. I would test it.

According to Pablo's reply to my earlier post, this is apparently not a good idea to do. Though it sounds like it /may/ work, with some likely undesired side effects.



Grant. . . .
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux