VM-Series with Alibaba Cloud HAVIP

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
L1 Bithead
100% helpful (1/1)

VM-Series with Alibaba Cloud HAVIPVM-Series with Alibaba Cloud HAVIP

 

VM-series firewalls can be deployed on Alibaba Cloud to protect inbound/outbound traffic to/from an Alibaba Cloud VPC. There are different ways to deploy VM-Series firewalls in order to achieve high availability (HA). Examples include Alicloud_VM_HA and Alicloud_LB_Sandwich.

 

Recently, Alibaba Cloud introduced a feature called HAVIP that will allow us to deploy VM-Series firewalls in active/standby mode on Alibaba Cloud. HAVIP works by listening to the ARP/GARP messages sent by the VM-Series firewalls to determine which network interfaces belong to the active VM-Series firewall, and it will forward traffic to those interfaces.

 

The HAVIP feature is currently in public preview. To test this feature, submit a ticket to have it enabled for your account.

 

Deployment Architecture

 

The diagram below shows how the VM-Series firewalls are deployed with HAVIP. The two VM-Series firewalls are configured in active/standby HA mode. Two HAVIP are configured. One HAVIP is configured with an attached public IP address (the External HAVIP). The Untrust interface of each VM-Series firewall is bound to this External HAVIP. The other HAVIP (the Internal HAVIP) do not have an attached public IP address. The Trust interface of each VM-Series firewall is bound to this Internal HAVIP.

 

Danielma911_0-1630896214016.png

 

Note that the HAVIP address must be in the same subnet as the network interfaces that are bound to it. In this example, the External HAVIP must be in the same subnet as the Untrust interfaces, while the Internal HAVIP must be in the same subnet as the Trust interfaces. Subnets in Alibaba Cloud cannot span multiple zones, so this solution will only work if both VM-Series firewalls are in the same Availability Zone. 

 

HAVIP Configuration

 

To create the External HAVIP, from your Alibaba Cloud console, go to VPC → HAVIP and click “Create HAVIP.” Choose the VPC and vSwitch, and provide a private IP address for the HAVIP.

 

Danielma911_1-1630896213998.png

 

Once the HAVIP has been created, click on it to enter into its configuration. You will see that nothing is bound at this time to the HAVIP.

 

Danielma911_2-1630896214022.png


Create an Elastic IP Address (EIP) if you have not already created one yet. Then click on the “Bind” button beside “Elastic IP Address” to bind the EIP to the HAVIP.

 

Danielma911_3-1630896213992.png

There are two ways to bind resources to the HAVIP. You can either bind an instance or a network interface. When binding with an instance, the primary network interface of the instance is used. For VM-Series firewalls, the primary network interface is the Management interface (since VM-Series firewalls do not support interface swap on Alibaba Cloud). So in this case, we need to bind using network interfaces.

 

To bind the Untrust interfaces of the VM-Series firewalls to the HAVIP, click on the “Bind” button under “ECS Instances." Choose “ENI” as the resource type, and then choose the Instance and ENI to bind to the HAVIP. Repeat the same procedure for the other Untrust interface.

 

Danielma911_4-1630896213992.png


Once the EIP and both Untrust interfaces are bound to the HAVIP, you should see them in the HAVIP configuration page.

 

Danielma911_5-1630896214006.png


Repeat the same procedure to create the Internal HAVIP. For the Internal HAVIP, there is no need to bind any EIP to it. The configuration for the Internal HAVIP should be similar to this:

 

Danielma911_6-1630896214014.png

 

Route Table Configuration

 

Traffic from the servers should be routed to the Internal HAVIP. To achieve this, a static route is configured in the Route Table associated with the server subnet.

 

To create a Route Table, from your Alicloud console, go to VPC → Route Tables. After creating the route table, add a custom route entry to point the default route to the Internal HAVIP, and associate this route table with the server vSwitch.

 

Danielma911_7-1630896214009.png

 

 

Danielma911_8-1630896213987.png

 

VM-Series Firewall Configuration

 

The VM-Series firewalls are configured in active/passive HA mode with configuration sync enabled. In this case, the Untrust and Trust interfaces are configured statically. The Untrust interface will be configured with the private IP address of the External HAVIP, while the Trust interface will be configured with the private IP address of the Internal HAVIP. As configuration sync is enabled, when a failover occurs, the newly active VM-Series firewall will use the same set of IP addresses for its Untrust and Trust interfaces.

 

Danielma911_9-1630896213983.png


The route table in the VM-Series firewall will need to include the default route via the Untrust interface, and a route to the server subnet via the Trust interface.

 

Danielma911_10-1630896213981.png

 

NAT rules need to be configured for Inbound and Outbound traffic.

 

Danielma911_11-1630896214011.png


For Inbound traffic, the NAT rule will have a destination address match on the private IP address of the External HAVIP. This destination address will be translated to the web server address by the NAT rule. Source translation is not required, so the server will see the actual public IP address of the client.

 

For Outbound traffic, the SNAT rule will match the source addresses of the servers. The source address will then be SNAT to the private IP address of the External HAVIP.  The External HAVIP will in turn SNAT the traffic to the public IP address of the External HAVIP.

 

Testing Inbound Traffic

 

The web server can be accessed via the public IP address of the External HAVIP. You can see in the following diagrams that the client can successfully access the web server, as well as the public IP address of the client. 

 

Danielma911_12-1630896214019.png

 

 

Danielma911_13-1630896213994.png

 

 

Danielma911_14-1630896213990.png

 

Testing Outbound Traffic

 

Accessing the Internet from the server, the source IP address used is detected to be that of the External HAVIP.

 

Danielma911_15-1630896213989.png

 

Danielma911_16-1630896213996.png

 

 

Failover Testing

 

A ping test was started on the server. The active VM-Series firewall is then suspended. The passive VM-Series firewall will then become active. From the ping test, there are about 11 ping drops before the traffic resumes. So the failover time is around 11 seconds.

 

Danielma911_17-1630896214012.png

 

In conclusion, two VM-Series firewalls can be deployed on Alibaba Cloud in active/passive HA mode with Alibaba Cloud HAVIP to provide high availability. This provides session and configuration sync between the two VM-Series firewalls. However, this only works in a single Availability Zone. If an increase in capacity is required, the VM-Series firewalls need to be scaled-up, e.g. VM300 → VM500.

 

A Note on Virtual CPU (vCPU) Instance Types 

 

The VM-Series firewalls used in the testing have four network interfaces: Management, Untrust, Trust and HA2. On most Alibaba Cloud instance types, the 4 vCPU instance types provide three network interfaces. The 8 vCPU instance types and above provide four or more network interfaces. 

 

Danielma911_18-1630896213985.png


If 4 vCPU instance types need to be used, the VM-Series firewalls will need to be deployed in one-arm mode as there can only be 3 network interfaces attached to each firewall. Inbound and outbound traffic will traverse the same data interface.

 

Written by: KuangBin Yeu - Consulting Engineer

Rate this article:
Comments
L1 Bithead
  • 8858 Views
  • 1 comments
  • 0 Likes
Register or Sign-in
Contributors
Labels
Article Dashboard
Version history
Last Updated:
‎09-09-2021 06:37 AM
Updated by: