I'm trying to build an app stack on FreeBSD using hierarchical vnet jails. It looks like this:
Within each [dev|stage|prod]_jail, I will have:
I am still building the the first part of this and haven't gotten to the hierarchical jails yet:
My jails are in 10.0.0.0/24. I have tried including this net range in my 'martians' list of unroutable addresses to protect my external interface. But this leads to the jails losing external internet access (pf.conf below). Is there a way do differentiate traffic on my internal 10.0.0.0/24 network ($jailnet) from outside unroutable world traffic on 10.0.0.0/8? I'd like to still block baddies on the outside, but allow my internal networks full connectivity.
Additional questions to show how little I understand about networking:
Q: I've read that lo0 is short for local 0, and is a virtual interface. I've also read that creating a bridge is 'cloning' the lo0 interface. Does that mean that all virtual interfaces can see each other? What about if they are on different subnets, e.g 10. and 192.? If I create bridge0 on 10.0.0.0/24 and bridge1 on 192.168.1.0/24, can these two subnets talk to each other? Should they be able to? Or say it was 10.0.0.0/24 and 10.0.1.0/24, what would we expect there? My expectation is that the examples above are different network segments and should not be able to talk to each other without something connecting them.
Note: I have read (and have on my desk) the following: mwlucas' jails, zfs, advanced zfs, networking for systems administrators (ok, i haven't read that much of this one), storage essentials, absolute freebsd, and absolute open bsd. A have read about half of kozierok's tcp/ip guide (that things huge).
Code:
HOST
+ JAILS
+ lb_jail
+ backup_jail
+ dev_jail
+ stage_jail
+ prod_jail
Within each [dev|stage|prod]_jail, I will have:
Code:
[dev|stage|prod]_jail
+ webserver
+ database
I am still building the the first part of this and haven't gotten to the hierarchical jails yet:
Code:
HOST
+ JAILS
+ lb_jail
+ backup_jail
My jails are in 10.0.0.0/24. I have tried including this net range in my 'martians' list of unroutable addresses to protect my external interface. But this leads to the jails losing external internet access (pf.conf below). Is there a way do differentiate traffic on my internal 10.0.0.0/24 network ($jailnet) from outside unroutable world traffic on 10.0.0.0/8? I'd like to still block baddies on the outside, but allow my internal networks full connectivity.
Additional questions to show how little I understand about networking:
Q: I've read that lo0 is short for local 0, and is a virtual interface. I've also read that creating a bridge is 'cloning' the lo0 interface. Does that mean that all virtual interfaces can see each other? What about if they are on different subnets, e.g 10. and 192.? If I create bridge0 on 10.0.0.0/24 and bridge1 on 192.168.1.0/24, can these two subnets talk to each other? Should they be able to? Or say it was 10.0.0.0/24 and 10.0.1.0/24, what would we expect there? My expectation is that the examples above are different network segments and should not be able to talk to each other without something connecting them.
Note: I have read (and have on my desk) the following: mwlucas' jails, zfs, advanced zfs, networking for systems administrators (ok, i haven't read that much of this one), storage essentials, absolute freebsd, and absolute open bsd. A have read about half of kozierok's tcp/ip guide (that things huge).