LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 06-22-2007, 02:50 PM   #1
habiem
LQ Newbie
 
Registered: Dec 2006
Posts: 20

Rep: Reputation: 0
Segregating Network Traffic


I have 3 servers. All need access to the internet via a firewall (8 ports) at 192.168.1.1. There is a 1Gbps switch (24 ports) between the servers, obviously behind the firewall.

Server A is a web server and will be accessible via the internet (still behind the firewall)
Server B is a database server and will only need to access the internet to get security patches.
Server C is an iSCSI target for Server A and will only need to access the internet to get security patches.

Server A needs to access the database on Server B. Server B really doesn't need access to Server C, but it would be an added benefit.

Server A, B, and C all have 2 1Gbps nics. If necessary, I can get another dual-port NIC for each.

I want to keep the web traffic on Server A off of the same nic that the iSCSI traffic is on. Is this possible since I want them all to have access out to the internet, if even only temporarily?

Should I connect all servers directly to the firewall on the 192.168.1.x range and then connect them to the switch on 192.168.2.x?

Thanks.
 
Old 06-22-2007, 03:09 PM   #2
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
don't really understand what the question is... you can segregate all you want but you've given an argument as to why you are interesting in splitting into different subnets int he first place. generally for the sort of architecture you're implying, you would place the http server in a DMZ, something your firewall should be more than capable of providing (PLEASE provide models and makes next time). after that there's really nothing interesting about their need for internet access. it's just down to your firewall to permit that... i get the feeling I've missed something though. if you have an iscsi connection then you can use a seperate unrouted subnet on whatever private address you want, just with a direct xover cable if you want. does the switch support vlans? if so you can put it back in there potentially, and just leave the iscsi server with a single nic with two vlans on it? what i would probably look to do myself is to bond and trunk all ports where possible. if you have two gig nics, turn them into a single 2gbps ethernet link with two vlans running across them. that increases throughput and resilience in one go.

Last edited by acid_kewpie; 06-22-2007 at 03:13 PM.
 
Old 06-22-2007, 04:00 PM   #3
habiem
LQ Newbie
 
Registered: Dec 2006
Posts: 20

Original Poster
Rep: Reputation: 0
Thanks.

I was trying to simplify a little bit and probably left out one or two things that are important to note. First of all, in response to your note about models, etc., the firewall is a Cisco ASA 5505. I just have the base 50 user license, which, I believe, allows for 3 systems in the DMZ. For now, that's fine, because there's only one web server, but over the next 1-2 years, we'll be adding additional servers and load balancing them, all of which will need access to the iSCSI target. I plan to make use of the Linux Virtual Server project for load balancing, etc.

The iSCSI target (Server C above), is actually 2 servers, using DRBD to replicate the data to the second node. One of the 2 1Gbps nics is used to connect the servers with a crossover cable to provide a dedicated 1Gbps pathway for DRBD.

The switch I have currently is a Dell PowerConnect 2724. It's support for VLAN's is minimal. You can tag port as VLAN members, but there's no real VLAN configuration. So, in the admin console for it, I can add a new VLAN, but my 'configuration' for it is limited to what I want to name it. Then, I just tag which ports on the switch should be part of that VLAN. The reason I got the switch to begin with is that I want to make sure that any traffic to and from the iSCSI target goes at the full 1Gbps, as the firewall is only a 10/100.

I guess where I'm stuck is that I want the iSCSI and anything that connects to it on a separate network or subnet so that it is forced to travel over NICs that are not used for any other traffic. If I do that, I'll need additional NICs, at least for the two iSCSI machines, correct? I don't see any way I can set the switch at 192.168.2.1 and have it provide access out to the net through the firewall, which is at 192.168.1.1, right?

Hopefully that makes more sense...I may have just confused myself more though...
 
Old 06-22-2007, 04:35 PM   #4
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
ooooooooooooh asa's. lovely. there's no (possible) limit on the number of hosts in a DMZ and the notion of a DMZ in the asa's is pleasantly flexible. as you bought a duff switch your scalability is limited there though... no problem though i guess. the dell official specs for the 2724 list full 802.1q support, so i'd be very keen to suggest that. also it lists 802.3ad. so here i'd take the webserver and the iscsi server and bond and trunk both ports, configuring 2 vlans on there, 192.168.1.0/24 for the internet traffic and 192.168.2.0/24 for the iscsi traffic. no, scrap that i guess... you can bond two gigabit nics into one. as such you can shift data at 2gbps across it. you are *NEVER* going to do that, right? you have a relatively small internet pipe so assuming iscsi activity is largely linear to web traffic, you just plain can't generate the requirement for such large iscsi traffic. as such on that link you would not be in danger of compromising network performance by using the same nics. the other angle to that is data security, and again logic arguments become subtler if you're using the same switch and cabling anyway, so i therefore see no reason to have a separate iscsi network (although here i admit i know *nothing* abuot iscsi other than it's scsi over ip. maybe there are technical requirements from the protocol.)

phew.


breathe.


better.


so both servers have two nics connected to the gig switch, on that same vlan you have an uplink to the cute little 5505 (isn't the power lead on it crap???). moving onwards i'd assume the other server would function in a wholly similar way to the web server, but would simply not be recieving any traffic.

one other angle about the internet access is that you *COULD* either make the web server route itself, or install a squid instance to allow the servers to actually sit right behind the box, not by the side of it. here you'd look at having 802.1q on the bonded nics to the switch, with one vlan connecting up to the asa, the other going behind to a vlan containing the iscsi and other box. diagramatically, you may well find that a more comforting architecture, even though i doubt there are really that many benefits from doing it that way
 
Old 06-22-2007, 08:38 PM   #5
habiem
LQ Newbie
 
Registered: Dec 2006
Posts: 20

Original Poster
Rep: Reputation: 0
If I bond them together, don't I have an awful lot of packets zipping around and potentially collisions? I mean, I'll have the DRBD traffic, the iSCSI traffic, and the OCFS2 heartbeat traffic, all running across those. If I separate the networks, I guess I get the DRBD traffic off of there onto it's own network, which is generally recommended by the authors of DRBD. I agree, I highly doubt I'll fill 2Gbps anytime soon, and the extra speed would be great in the case of a large file (which is fairly unlikely).
 
Old 06-22-2007, 09:35 PM   #6
habiem
LQ Newbie
 
Registered: Dec 2006
Posts: 20

Original Poster
Rep: Reputation: 0
On another note, I may be hosed if I want to take advantage of the 802.1q support on the dell switch -- with my license on the ASA 5505, trunking is disabled, making it impossible to bridge between 192.168.2.0/24 and 192.168.1.0/24, right? That was the one thing about the ASA 5505 that I really didn't like. Unless you buy the 'Security Plus' license, you really get screwed out of a lot of features. The Security Plus license costs more than the 5505 to begin with...
 
Old 06-23-2007, 01:56 AM   #7
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
no, you'll have less collisions not more as you have more bandwidth and two separate links to the machines upon which collisions can occur. your busier link if you had seperate ones is going to be quieter as the load is spread better. at 2gbp collisions really aren't going to be an issue.

you can't "bridge" between two different subnets, do you mean routing?? what I've suggested above would never use anything up to the 5505 other than a single untagged connection (or rather an etherchannel on the 5505 to use two links cos you can), no vlan's no knowledge of additional subnets.
 
Old 06-23-2007, 08:13 AM   #8
habiem
LQ Newbie
 
Registered: Dec 2006
Posts: 20

Original Poster
Rep: Reputation: 0
Yeah, I meant route. As you may have noticed, networking is not exactly my strong point... Long story, but I'm a developer, turned server admin (not by choice), that is now ending up with the configuration above. As soon as the project is making a little more, I'll be hiring a good sysadmin...

Anyway, so, it sounds like maybe I can just put everything on a 192.168.1.0/24, use bonded/trunked connections on all of the servers to essentially create a 2Gbps network, then link the dell switch to the ASA wtih 2 100Mbps connections. I do like the redundancy of the bonding/trunking of the NICs...

I'll pick up some additional cat5e and give this a whirl. Thanks for your help!
 
Old 06-23-2007, 09:51 AM   #9
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
cat6...

i would probably suggest the single network, as whilst my later suggestion does provide a second network, which looks good on a conceptual diagram, when it's being managed on a single switch the practical benefits tend to become minimal rapidly.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Darkstat - Network Traffic Analyzer or Network Monitor LXer Syndicated Linux News 0 07-04-2006 08:33 AM
When the network traffic increase over some limit network works interruptedly therrman Linux - Hardware 0 11-15-2005 02:23 AM
How to allow traffic from One Network to Other??? cranium2004 Linux - Networking 1 01-06-2005 12:17 PM
Can't get any network traffic jonlake Linux - Networking 6 05-27-2004 10:43 AM
Network Traffic BxBoy Programming 3 02-24-2003 08:31 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 08:07 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration