ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Virtualizing Smoothwall (edge firewall and content filtering)

    IT Discussion
    4
    15
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender
      last edited by

      Please tell me this server does something other than just run this.

      That's a lot of power consumption for a firewall. Personally I'd ditch it for an Edge Router Lite or ER-X or a USG. All of these are from Ubiquiti and run from $55-130.

      It's a tiny box, power consumption will be next to nothing, and you can repurpose the whole server as a XS box.

      JaredBuschJ 1 Reply Last reply Reply Quote 1
      • JaredBuschJ
        JaredBusch @Dashrender
        last edited by JaredBusch

        @Dashrender said in Virtualizing Smoothwall (edge firewall and content filtering):

        Please tell me this server does something other than just run this.

        That's a lot of power consumption for a firewall. Personally I'd ditch it for an Edge Router Lite or ER-X or a USG. All of these are from Ubiquiti and run from $55-130.

        It's a tiny box, power consumption will be next to nothing, and you can repurpose the whole server as a XS box.

        That depends on how he is using it. It is a lot, but if he is doing full UTM functionality, that takes power.

        If he is just doing routing, then yeah.

        1 Reply Last reply Reply Quote 0
        • stacksofplatesS
          stacksofplates
          last edited by

          It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

          jrcJ 1 Reply Last reply Reply Quote 0
          • jrcJ
            jrc
            last edited by

            This box is our firewall, heuristic content filtering, internet traffic logging (by user and by client) and UTM for around 3500 devices, so yeah I need the power and RAM for what it does. https://us.smoothwall.com/web-filtering/ for more info on all it does.

            We rely on quite a few internet based service, and if this box goes down it is extremely disruptive. And the benefits I'd get from virtualizing are immense for this purpose. Being able to minimize my downtime via snapshots and/or migration between hosts of different hardware profiles are not things that I can easily dismiss. And then there is the fringe benefit of being able to export a snapshot, throw it onto a test server and then be able to thoroughly test updates and config changes is a pretty big too.

            So I guess what I am trying to work out is are the tradeoffs worth it.

            1 Reply Last reply Reply Quote 0
            • jrcJ
              jrc @stacksofplates
              last edited by

              @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

              It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

              Even if I have multiple interfaces, one that will be dedicated to public/internet and one for internal/management? This seems to boil down to how well the host handles isolation of the traffic, which is probably pretty good I think.

              JaredBuschJ 1 Reply Last reply Reply Quote 0
              • JaredBuschJ
                JaredBusch @jrc
                last edited by

                @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

                Even if I have multiple interfaces, one that will be dedicated to public/internet and one for internal/management? This seems to boil down to how well the host handles isolation of the traffic, which is probably pretty good I think.

                Virtualizing a router is fine. I have done it and know others that have as well. You do not need to worry about host access to the NIC on the WAN side if the host is not configured to use it. That is kind of the point of it.

                stacksofplatesS 1 Reply Last reply Reply Quote 0
                • stacksofplatesS
                  stacksofplates @JaredBusch
                  last edited by

                  @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                  @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                  @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                  It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

                  Even if I have multiple interfaces, one that will be dedicated to public/internet and one for internal/management? This seems to boil down to how well the host handles isolation of the traffic, which is probably pretty good I think.

                  Virtualizing a router is fine. I have done it and know others that have as well. You do not need to worry about host access to the NIC on the WAN side if the host is not configured to use it. That is kind of the point of it.

                  I was always under this impression, but Scott made it sound like this wasn't recommended. I had done this until a while ago when he said that.

                  JaredBuschJ 1 Reply Last reply Reply Quote 1
                  • JaredBuschJ
                    JaredBusch @stacksofplates
                    last edited by

                    @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                    @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                    @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                    @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                    It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

                    Even if I have multiple interfaces, one that will be dedicated to public/internet and one for internal/management? This seems to boil down to how well the host handles isolation of the traffic, which is probably pretty good I think.

                    Virtualizing a router is fine. I have done it and know others that have as well. You do not need to worry about host access to the NIC on the WAN side if the host is not configured to use it. That is kind of the point of it.

                    I was always under this impression, but Scott made it sound like this wasn't recommended. I had done this until a while ago when he said that.

                    It depends on your needs. The OP needs a beefy edge device because of the use case. There is not a problem with virtualizing it on the current hardware as long as he still gets the performance he needs.

                    What is recommended against by me (I do not recall what @scottalanmiller said that you are referencing), is to never try to virtualize your router on your standard production hypervisor. This is because you have no access to anything if it goes down. That is a bad place to be in.

                    stacksofplatesS 1 Reply Last reply Reply Quote 0
                    • stacksofplatesS
                      stacksofplates @JaredBusch
                      last edited by stacksofplates

                      @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                      @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                      @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                      @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                      @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                      It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

                      Even if I have multiple interfaces, one that will be dedicated to public/internet and one for internal/management? This seems to boil down to how well the host handles isolation of the traffic, which is probably pretty good I think.

                      Virtualizing a router is fine. I have done it and know others that have as well. You do not need to worry about host access to the NIC on the WAN side if the host is not configured to use it. That is kind of the point of it.

                      I was always under this impression, but Scott made it sound like this wasn't recommended. I had done this until a while ago when he said that.

                      It depends on your needs. The OP needs a beefy edge device because of the use case. There is not a problem with virtualizing it on the current hardware as long as he still gets the performance he needs.

                      What is recommended against by me (I do not recall what @scottalanmiller said that you are referencing), is to never try to virtualize your router on your standard production hypervisor. This is because you have no access to anything if it goes down. That is a bad place to be in.

                      Ok I'll go back to using that as an option then. It's nice to be able to scale the router up as needed (within the host limits of course).

                      Here is what I was referencing :

                      0_1486693017294_IMG_0008.PNG

                      JaredBuschJ 1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch @stacksofplates
                        last edited by

                        @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                        @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                        @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                        @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                        @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                        @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                        It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

                        Even if I have multiple interfaces, one that will be dedicated to public/internet and one for internal/management? This seems to boil down to how well the host handles isolation of the traffic, which is probably pretty good I think.

                        Virtualizing a router is fine. I have done it and know others that have as well. You do not need to worry about host access to the NIC on the WAN side if the host is not configured to use it. That is kind of the point of it.

                        I was always under this impression, but Scott made it sound like this wasn't recommended. I had done this until a while ago when he said that.

                        It depends on your needs. The OP needs a beefy edge device because of the use case. There is not a problem with virtualizing it on the current hardware as long as he still gets the performance he needs.

                        What is recommended against by me (I do not recall what @scottalanmiller said that you are referencing), is to never try to virtualize your router on your standard production hypervisor. This is because you have no access to anything if it goes down. That is a bad place to be in.

                        Ok I'll go back to using that as an option then. It's nice to be able to scale the router up as needed (within the host limits of course).

                        Here is what I was referencing:

                        0_1486693017294_IMG_0008.PNG

                        He specifically mentions this use case as acceptable. A one to one dedicated piece of hardware.

                        stacksofplatesS 1 Reply Last reply Reply Quote 1
                        • stacksofplatesS
                          stacksofplates @JaredBusch
                          last edited by

                          @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                          @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                          @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                          @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                          @JaredBusch said in Virtualizing Smoothwall (edge firewall and content filtering):

                          @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                          @stacksofplates said in Virtualizing Smoothwall (edge firewall and content filtering):

                          It's usually better to keep it on hardware. The host has outside access before the firewall/UTM has any control over the network.

                          Even if I have multiple interfaces, one that will be dedicated to public/internet and one for internal/management? This seems to boil down to how well the host handles isolation of the traffic, which is probably pretty good I think.

                          Virtualizing a router is fine. I have done it and know others that have as well. You do not need to worry about host access to the NIC on the WAN side if the host is not configured to use it. That is kind of the point of it.

                          I was always under this impression, but Scott made it sound like this wasn't recommended. I had done this until a while ago when he said that.

                          It depends on your needs. The OP needs a beefy edge device because of the use case. There is not a problem with virtualizing it on the current hardware as long as he still gets the performance he needs.

                          What is recommended against by me (I do not recall what @scottalanmiller said that you are referencing), is to never try to virtualize your router on your standard production hypervisor. This is because you have no access to anything if it goes down. That is a bad place to be in.

                          Ok I'll go back to using that as an option then. It's nice to be able to scale the router up as needed (within the host limits of course).

                          Here is what I was referencing:

                          0_1486693017294_IMG_0008.PNG

                          He specifically mentions this use case as acceptable. A one to one dedicated piece of hardware.

                          Ahi misunderstood what that meant. When we had that discussion that is how I had it set up, but somehow thought he meant something else.

                          1 Reply Last reply Reply Quote 0
                          • jrcJ
                            jrc
                            last edited by

                            Yeah, this will be a dedicated piece of hardware with the hypervisor on it and just a single VM, the Smoothwall install. Nothing else, and it will not be tied into my existing pool, it will be, for the most part stand alone.

                            As to the point of no access if things go down, I don't see that as a major issue, because if things go down like that, then I will need to be on site, in which case I would have physical access to the server and will then be able to fix it from there if needed.

                            This device is how my network is connected to the internet, so if it goes down I have zero remote access, with or without it being virtualized.

                            JaredBuschJ DashrenderD 2 Replies Last reply Reply Quote 1
                            • JaredBuschJ
                              JaredBusch @jrc
                              last edited by

                              @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                              Yeah, this will be a dedicated piece of hardware with the hypervisor on it and just a single VM, the Smoothwall install. Nothing else, and it will not be tied into my existing pool, it will be, for the most part stand alone.

                              As to the point of no access if things go down, I don't see that as a major issue, because if things go down like that, then I will need to be on site, in which case I would have physical access to the server and will then be able to fix it from there if needed.

                              This device is how my network is connected to the internet, so if it goes down I have zero remote access, with or without it being virtualized.

                              Correct, but when people put these on the main hypervisor, it just seems to cause problems because they forget, or update piece X and break it, or some other random thing.

                              1 Reply Last reply Reply Quote 1
                              • DashrenderD
                                Dashrender @jrc
                                last edited by

                                @jrc said in Virtualizing Smoothwall (edge firewall and content filtering):

                                Yeah, this will be a dedicated piece of hardware with the hypervisor on it and just a single VM, the Smoothwall install. Nothing else, and it will not be tied into my existing pool, it will be, for the most part stand alone.

                                As to the point of no access if things go down, I don't see that as a major issue, because if things go down like that, then I will need to be on site, in which case I would have physical access to the server and will then be able to fix it from there if needed.

                                This device is how my network is connected to the internet, so if it goes down I have zero remote access, with or without it being virtualized.

                                If you have an iLo or like option on the server, you could make that available either directly to the internet, or through an ER-X that you VPN into. This would require it's own IP just for that.

                                1 Reply Last reply Reply Quote 0
                                • 1 / 1
                                • First post
                                  Last post