ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Networking and 1U Colocation

    IT Discussion
    colocation networking virtualization software defined network
    15
    103
    9.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @JaredBusch
      last edited by

      @jaredbusch said in Networking and 1U Colocation:

      @scottalanmiller said in Networking and 1U Colocation:

      @tim_g said in Networking and 1U Colocation:

      This is the one I currently use, but $20/month because I got it when it was on special:

      0_1521732865342_5bfd92b7-9fab-49f8-a0b2-3ed9faa82b99-image.png

      That's not colo, though.

      Yes, he was clear stating he currently used them for VPS. Did you miss that?

      I saw it earlier, but then was confused here.

      1 Reply Last reply Reply Quote 0
      • EddieJenningsE
        EddieJennings
        last edited by EddieJennings

        I'm trying to think through how I'd configure my network using a VM on my KVM host as my router/firewall. This is the first draft of how I see this working.

        0_1521768461730_colonetwork1.png

        The networks with which I've worked in the past have a firewall that would have one interface with a public IP (100.100.100.2/30) and one with a private IP (192.168.1.1/24), which connects to a switch, which connects to everything else. NAT would be used to direct traffic to specific hosts, such as NATing inbound traffic for 100.100.100.2:80 to a webserver at 192.168.1.10.

        I'm trying to wrap my head around how to make that concept work in an virtualized environment where I have a single hypervisor and no networking appliance. I'd obviously have a virtual switch which wouldn't have any connection to a physical NIC on the host for the guest VMs (the 192.168.1.0/24 network). I'd have another virtual switch which would have a connection to the physical NIC. The firewall VM would have a connection to each virtual switch.

        The question becomes what NIC receives the public IP address I'll be assigned. My first thought was the interface of the firewall VM that's attached to the virtual switch that's attached to the NIC of the physical host. However, that seems problematic, as at the moment, I don't know how a packet destined for 100.100.100.2 coming in on eth0 of the host would be forwarded to the virtual switch.

        There are other questions; however, I think this has to be addressed first.

        RomoR 1 Reply Last reply Reply Quote 0
        • JaredBuschJ
          JaredBusch
          last edited by

          With a /30 it is hard because you have to setup your host without a valid IP on the colo network.

          So you will need a private management network to access the host remotely.

          You will have to rely on the colo's KVM for console access to your dom0 to fix anything if it breaks.

          You should easily be able to configure this ahead of time.

          1 Reply Last reply Reply Quote 1
          • JaredBuschJ
            JaredBusch
            last edited by

            This will get into how you want to configure your KVM host's networking in the first place.

            I don't have network connectivity from my KVM host in my home lab to my guests because I have full access to the host's main IP and never bothered to set anything else up.

            1 Reply Last reply Reply Quote 0
            • RomoR
              Romo @EddieJennings
              last edited by

              @eddiejennings

              @eddiejennings said in Networking and 1U Colocation:

              I'm trying to think through how I'd configure my network using a VM on my KVM host as my router/firewall. This is the first draft of how I see this working.

              0_1521768461730_colonetwork1.png

              The networks with which I've worked in the past have a firewall that would have one interface with a public IP (100.100.100.2/30) and one with a private IP (192.168.1.1/24), which connects to a switch, which connects to everything else. NAT would be used to direct traffic to specific hosts, such as NATing inbound traffic for 100.100.100.2:80 to a webserver at 192.168.1.10.

              I'm trying to wrap my head around how to make that concept work in an virtualized environment where I have a single hypervisor and no networking appliance. I'd obviously have a virtual switch which wouldn't have any connection to a physical NIC on the host for the guest VMs (the 192.168.1.0/24 network). I'd have another virtual switch which would have a connection to the physical NIC. The firewall VM would have a connection to each virtual switch.

              The question becomes what NIC receives the public IP address I'll be assigned. My first thought was the interface of the firewall VM that's attached to the virtual switch that's attached to the NIC of the physical host. However, that seems problematic, as at the moment, I don't know how a packet destined for 100.100.100.2 coming in on eth0 of the host would be forwarded to the virtual switch.

              There are other questions; however, I think this has to be addressed first.

              Maybe try this, lets see if I can explain myself well.

              Attach your physical interface to a linux-bridge (lets call it br0) and then assign the br0 interface only to your firewall vm. Set the static address 100.100.100.2 on the vms interface this will be your wan port .

              Create a private network and set it to isolated, it will create a virbrX interface in your host. Add an interface to your vm inside the isolated private network (using virbrX), this will be your firewalls lan interface.
              Your virtual network gives you internal and host only routing, so you will have access to your guest through this ip range.

              0_1521772514310_isolated-network.png

              Any new vm you create add it interface to be part of your virtual network and set their gateway to your firewall-vms lan port.

              0_1521772718450_vm-with-isolated-network-interface.png

              I believe that should do what you want.

              JaredBuschJ 1 Reply Last reply Reply Quote 0
              • JaredBuschJ
                JaredBusch @Romo
                last edited by

                @romo He does not even need a bridge. Simply no IP on his eth0.

                He will have a java based KVM available for console from his colo if shit really breaks.

                Here in my example I have an IP on eno1 just because it is local to me and i am lazy. He should have no IP here.
                3_1521774976802_Selection_355.png

                I have a team, he will not with only a single port from the colo. He could have a team still with one memeber not plugged in, but meh.
                2_1521774976802_Selection_356.png

                When he makes the pfSense VM, he should assign it to his eth0 (team0 in my example) as macvtap.
                1_1521774976802_Selection_357.png

                In bridged mode. As the note states, there will not be any guest communication to the host on this network, which is just fine for security of the router VMs public IP network.
                0_1521774976802_Selection_358.png

                By default the LVM setup create this private network. I suggest he use this on his host and a single guest VM (not his pfSense VM) to manage the host.
                4_1521774976802_Selection_354.png

                I suggested he make another private network that he will assign to the LAN port of the pfSense VM and then as the only network port for all of the guest VMs.

                RomoR EddieJenningsE 2 Replies Last reply Reply Quote 3
                • RomoR
                  Romo @JaredBusch
                  last edited by

                  @jaredbusch I am so used to creating my bridges manually I keep forgetting macvtap creates them for you.

                  1 Reply Last reply Reply Quote 0
                  • travisdh1T
                    travisdh1
                    last edited by

                    I had to do something a little different as I rent a server that I'll never have physical access to. So this is on an Ubuntu Server base (that always leaves a bad taste in my mouth, sorry.)

                    eth0 is all I had to work with:
                    0_1521783276353_193e9210-7cea-4b69-a884-ee50c022c033-image.png

                    So I also made a virtual interface:
                    0_1521783336979_8595e2f4-350f-407d-8774-cd6a4663e75c-image.png

                    Virtual Interface that is the public facing side:
                    0_1521783396102_6cbf70be-c476-4f7b-b7ad-d325027c733f-image.png

                    Finally, the private side:
                    0_1521783452469_1cc17ccd-d705-4ca2-ba14-839d51fdb70b-image.png

                    Now, if you ask me (you didn't, I'll tell you anyway), this way of configuring things kinda sucks. I'm limited to 100mb/s throughput by something along the line that I haven't figured out yet.... I've got stories about these already, I don't need more!

                    1 Reply Last reply Reply Quote 0
                    • EddieJenningsE
                      EddieJennings @JaredBusch
                      last edited by

                      @jaredbusch said in Networking and 1U Colocation:

                      I want to make sure my understanding of your suggestion is correct.

                      The FirewallVM will have one NIC connected to eth0 via macvtap, which would be assigned 100.100.100.2/30. The FirewallVM will have a second NIC attached to what you called the priv0 virtual network, which serves as the interface to the rest of the VMs in the LAN. For managing the host itself, I'll have another VM attached to the default virtual network.

                      1 Reply Last reply Reply Quote 1
                      • EddieJenningsE
                        EddieJennings
                        last edited by

                        I'm thinking through this topology a bit further:

                        1. Eth0 on host passes traffic via macvtap to FirewallVM (100.100.100.2/30).
                        2. Isolated network connects FirewallVM to the rest of the guest VM.
                        3. Isolated network connects one of the guest VMs to the host VM.

                        To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three. Once connected to that VM, then I'd SSH from there to my host -- basically making that guest VM jump box.

                        travisdh1T JaredBuschJ 2 Replies Last reply Reply Quote 0
                        • travisdh1T
                          travisdh1 @EddieJennings
                          last edited by

                          @eddiejennings said in Networking and 1U Colocation:

                          I'm thinking through this topology a bit further:

                          1. Eth0 on host passes traffic via macvtap to FirewallVM (100.100.100.2/30).
                          2. Isolated network connects FirewallVM to the rest of the guest VM.
                          3. Isolated network connects one of the guest VMs to the host VM.

                          To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three. Once connected to that VM, then I'd SSH from there to my host -- basically making that guest VM jump box.

                          VyOS has ssh built in.... just saying.

                          JaredBuschJ 1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @travisdh1
                            last edited by

                            @travisdh1 said in Networking and 1U Colocation:

                            @eddiejennings said in Networking and 1U Colocation:

                            I'm thinking through this topology a bit further:

                            1. Eth0 on host passes traffic via macvtap to FirewallVM (100.100.100.2/30).
                            2. Isolated network connects FirewallVM to the rest of the guest VM.
                            3. Isolated network connects one of the guest VMs to the host VM.

                            To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three. Once connected to that VM, then I'd SSH from there to my host -- basically making that guest VM jump box.

                            VyOS has ssh built in.... just saying.

                            Umm WTF? Open SSH to the world? On your router? Fuck that.

                            AdamFA 1 Reply Last reply Reply Quote 0
                            • JaredBuschJ
                              JaredBusch @EddieJennings
                              last edited by JaredBusch

                              @eddiejennings said in Networking and 1U Colocation:

                              To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three.

                              Never.

                              Use ZeroTier on your host. In the instance that it fails, use the colo's KVM to fix it.

                              EddieJenningsE 1 Reply Last reply Reply Quote 0
                              • EddieJenningsE
                                EddieJennings @JaredBusch
                                last edited by

                                @jaredbusch said in Networking and 1U Colocation:

                                @eddiejennings said in Networking and 1U Colocation:

                                To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three.

                                Never.

                                Use ZeroTier on your host. In the instance that it fails, use the colo's KVM to fix it.

                                I’ve heard of ZeroTier. Time to learn something about it.

                                JaredBuschJ scottalanmillerS 2 Replies Last reply Reply Quote 0
                                • JaredBuschJ
                                  JaredBusch @EddieJennings
                                  last edited by

                                  @eddiejennings said in Networking and 1U Colocation:

                                  @jaredbusch said in Networking and 1U Colocation:

                                  @eddiejennings said in Networking and 1U Colocation:

                                  To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three.

                                  Never.

                                  Use ZeroTier on your host. In the instance that it fails, use the colo's KVM to fix it.

                                  I’ve heard of ZeroTier. Time to learn something about it.

                                  Here you go.
                                  https://www.zerotier.com/

                                  https://mangolassi.it/topic/16853/installing-zerotier-on-fedora

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @EddieJennings
                                    last edited by

                                    @eddiejennings said in Networking and 1U Colocation:

                                    @jaredbusch said in Networking and 1U Colocation:

                                    @eddiejennings said in Networking and 1U Colocation:

                                    To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three.

                                    Never.

                                    Use ZeroTier on your host. In the instance that it fails, use the colo's KVM to fix it.

                                    I’ve heard of ZeroTier. Time to learn something about it.

                                    Very good product.

                                    1 Reply Last reply Reply Quote 0
                                    • AdamFA
                                      AdamF @JaredBusch
                                      last edited by

                                      @jaredbusch said in Networking and 1U Colocation:

                                      @travisdh1 said in Networking and 1U Colocation:

                                      @eddiejennings said in Networking and 1U Colocation:

                                      I'm thinking through this topology a bit further:

                                      1. Eth0 on host passes traffic via macvtap to FirewallVM (100.100.100.2/30).
                                      2. Isolated network connects FirewallVM to the rest of the guest VM.
                                      3. Isolated network connects one of the guest VMs to the host VM.

                                      To manage my host over the Internet, I'd have a NAT rule that would direct SSH traffic to VM in item three. Once connected to that VM, then I'd SSH from there to my host -- basically making that guest VM jump box.

                                      VyOS has ssh built in.... just saying.

                                      Umm WTF? Open SSH to the world? On your router? Fuck that.

                                      Your direct, to the point responses, often have me LOLing.

                                      1 Reply Last reply Reply Quote 0
                                      • EddieJenningsE
                                        EddieJennings
                                        last edited by EddieJennings

                                        Here's an updated diagram.
                                        0_1522199669938_colonetwork2.png

                                        I'm wondering about how to do updates on the KVM host. Since there will be only one NIC with an connection to the colo's network, and that NIC is attached to the FirewallVM, it seems that the KVM host will have to have a way to send / receive traffic to / from the FirewallVM to have an Internet connection. Perhaps one alternative would be to setup a VM that acts like a repository for the updates I'd get through dnf and the KVM host would talk to that VM to get its software updates.

                                        The other thing I'm thinking about is how I'm going to use Virt-Manager with my KVM host. Methinks this might be where ZeroTier would come in. I could connect to the "VM for managing the host" which would have Virt-Manager installed.

                                        JaredBuschJ 1 Reply Last reply Reply Quote 0
                                        • JaredBuschJ
                                          JaredBusch @EddieJennings
                                          last edited by

                                          @eddiejennings said in Networking and 1U Colocation:

                                          Here's an updated diagram.
                                          0_1522199669938_colonetwork2.png

                                          I'm wondering about how to do updates on the KVM host. Since there will be only one NIC with an connection to the colo's network, and that NIC is attached to the FirewallVM, it seems that the KVM host will have to have a way to send / receive traffic to / from the FirewallVM to have an Internet connection. Perhaps one alternative would be to setup a VM that acts like a repository for the updates I'd get through dnf and the KVM host would talk to that VM to get its software updates.

                                          The other thing I'm thinking about is how I'm going to use Virt-Manager with my KVM host. Methinks this might be where ZeroTier would come in. I could connect to the "VM for managing the host" which would have Virt-Manager installed.

                                          Just add a NIC on you LAN network. Keep it normally disabled. Enable and run updates.

                                          Or just not be super paranoid and just have it on the LAN always.

                                          EddieJenningsE 1 Reply Last reply Reply Quote 0
                                          • EddieJenningsE
                                            EddieJennings @JaredBusch
                                            last edited by

                                            @jaredbusch said in Networking and 1U Colocation:

                                            Or just not be super paranoid and just have it on the LAN always.

                                            Ha! 😄

                                            JaredBuschJ 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 3 / 6
                                            • First post
                                              Last post