June 2014 Hang Out
Firewalls and Virtualization
Chris Buechler
Project News
● Training registration now open
○ August 1-2
○ September 5-6
○ In-person, in Austin, Texas
○ https://www.pfsense.org/university/
● 2.1.4 release available
○ Release notes at blog.pfsense.org
Virtualization Overview
● Means of running multiple OSes on a single
piece of hardware
● Types 1 and 2, 0? 1.5?
● Desktop class
● Server class
Virtualization Usage Scenarios
● Production systems
● Testing and development environments
● Fun but ugly hacks
Virtualization Security
● Are virtual firewalls secure?
○ it depends
● Hypervisor vulnerabilities
○ Guest to host
○ Guest to guest
● More subject to human error
Virtual Networking - Desktop
● Bridged
● NAT
● Host-only
● Internal
Virtual Networking - Bridged
● Put VM on the same broadcast domain as a
physical NIC
Virtual Networking - Bridged
Virtual Networking - Bridged
● Caveats with wireless
● Be careful!
○ More damage potential than other options
○ Rogue DHCP servers
○ IP conflicts
○ CARP VHID conflicts
○ Layer 2 loops
Virtual Networking - NAT
● Share host’s IP(s)
○ including (some) VPNs
● Easiest to deal with at times
● Separate broadcast domain safer
● NAT router inside hypervisor
● Complications reaching VM from physical
network
Virtual Networking - NAT
Virtual Networking - Host-only
● Allow connectivity to host
● No outside connectivity
○ provided by hypervisor at least
Virtual Networking - Internal
● No connectivity to host
○ on that vswitch at least
VirtualBox Networking
demo
VMware Workstation Networking
demo
Parallels and VMware Fusion
● Same basic capabilities of others
○ Bridged
○ NAT (“Shared”)
○ Host-only
Host OS Network Configuration
demo
Virtual Networking - Server
● Concepts
● VLAN handling
● NIC PCI passthrough
Virtual Networking - ESX
● vSwitches
○ None, one or more associated physical NICs
○ Port groups within vswitches
■ optionally with VLAN ID
■ Can pass all tagged VLANs
demo
Virtual Networking - HyperV
● Three types
○ External - bridged to physical NIC
○ Internal - bridged to virtual NIC on host (“host-only”)
○ Private - VM-only, no host connection
demo
Virtualizing Production Firewalls
● Can be great fit
○ but not always
● Need firewall to manage virtualization
environment? Keep at least 1 physical
firewall!
Virtualizing Production Firewalls
● Typical basic architecture
Performance Considerations
● Some overhead vs. bare metal
○ many times doesn’t matter
○ could be faster (vs. bare metal on slower hardware)
Performance Considerations - HA
● Promiscuous mode often required for
anything using virtual MACs
○ CARP, VRRP, HSRP
○ One MAC, or all the MACs
● With high traffic, can flood firewall NIC
Test and Development Environments
High Availability Considerations
● Hypervisor-level HA not a replacement for
pfSense HA
Virtual Hacks
● In a bind? Need a quick temporary fix?
Questions?
Feedback, comments, suggestions
welcome to gold@pfsense.org

Firewalls and Virtualization - pfSense Hangout June 2014