tryllz
(tryllz)
May 25, 2024, 9:34am
1
Hi,
I have the below setup on a ESXi host.
Firewall Router has no restrictions.
For context, I have a Windows Server 2022 running Veeam, and Starwind SANAndNAS configured for backup storage as Hardened Linux Repository, and a user veeam is created for managing VHR.
Starwind has 2 interfaces,
10.11.30.178 for management (not shown), and
10.11.40.178 for Data.
SSH works fine when accessed via Management interface but not when accessed via the Data interface.
I can ping from VM1 to VM2 but cannot SSH into it, and shows the below error.
key_exchange_identification: read: Connection timed out
SSH service is running fine on VM2.
Any thoughts what might be wrong ?
If everything is on the same network, everything works fine.
Thank You
Rod-IT
(Rod-IT)
May 25, 2024, 9:47am
2
What is your router VM? If it has a firewall on it, like Pfsense/OPNsense, make sure the two VLANS can communicate on port 22 or all ports if they are trusted internal networks - both ways
tryllz
(tryllz)
May 25, 2024, 10:00am
3
the router VM is a Fortigate firewall VM, all ports and protocols are allowed on all interfaces, both ways…
Rod-IT
(Rod-IT)
May 25, 2024, 10:12am
4
is 10.11.x.x your data interface, if so, isn’t it by design that the management interface is the only one that should work?
tryllz
(tryllz)
May 25, 2024, 10:18am
5
I tested this in a different setup with no router involved, and I could reach both interfaces via SSH, nothing in documentation about SSH access via management interface either…
Just done some ping checks, seems Data interface is not reaching firewall interface 10.11.30.100…
In this case is there suppose to be a Static route between them ?
if yes, I was under the assumption as both interface are on the same firewall explicit Static need not be set ?!
Rod-IT
(Rod-IT)
May 25, 2024, 10:50am
6
Firewalls and routers are different things, while firewalls can route, you have to create firewall rules between the two VLANs and depending your firewalls configuration, you may also have to create the routes.
1 Spice up
tryllz
(tryllz)
May 25, 2024, 10:59am
7
Thanks @Rod-IT
I have policies between both VLAN interfaces, will dig further…
If you are using VLANs, then you would need 2 vSwitch on the ESXi which are VLAN-tagged and then the vSwitches would also have physical NICs to your physical switches that are VLAN tagged ? And above that, I would also assume that the subnets are /19 or smaller.
I do not really understand the design of the router-VM ?
The VMs should be linked to their respective vSwitch
The Router-VM should be linked to both vSwitches
If you are using a firewall as a router, you will also need to open the required port(s) as some SSH applications uses all 4 ports (21, 22, 23, 25)
Then a bit out of context…
which Veeam product are you using
why storing backup data sets on a VM
security of out, even if you have a VLAN and different subnet when ping, SSH, FTP or SMB is enabled (this is like basic loophole) ?
1 Spice up
tryllz
(tryllz)
May 25, 2024, 1:42pm
9
I have 2 vSwitches, Portgroup 1G is on vSwitch 1G, and Portgroup 10G is on vswitch 10G…
adrian_ych:
The VMs should be linked to their respective vSwitch
The Router-VM should be linked to both vSwitches
This is correct and is how you have mentioned (the VM connectivity in the diagram is not accurate but both VMs are in their respective Portgroups connecting to their respective vSwitch, and the Router VM is connected to both vSwitches)…
adrian_ych:
If you are using a firewall as a router, you will also need to open the required port(s) as some SSH applications uses all 4 ports (21, 22, 23, 25)
The firewall has no restrictions, all traffic is allowed on all ports…
adrian_ych:
which Veeam product are you using
why storing backup data sets on a VM
Veeam 12
This is just a lab environment
Hi @tryllz and thank you for your interest in our products!
We have SSH up without binding to the interface. Therefore, it should work on any link. SSH is also used for communication between StarWind VMs and gets enabled automatically as soon as you create an HA device.
You most likely have some specific network configuration that prevents you from connecting to SSH on the data network. Let me know if you need any assistance with that, and I will gladly ask one of our engineers to help you.
Should you have any questions, do not hesitate to ping me directly. A complete guide on setting up our Veeam Hardened Repository can be found here https://www.starwindsoftware.com/blog/starwind-vsan-as-hardened-repository-for-veeam-backup-and-replication .
I wish you a perfect weekend!
tryllz
(tryllz)
May 25, 2024, 6:25pm
11
Thanks @supaplex-starwind
@Rod-IT guided me right, it was a routing problem and nothing to do with StarWind. As StarWind had 2 interfaces the Firewall was disabled for Asymmetric Routing, which is why SSH wasn’t responding.
Enabled Asymmetric Routing in Fortigate…
config system settings
set asymroute enable
end
And now I’m able to reach SSH over the Data interface…
Thanks @Rod-IT and @adrian_ych
Excellent! Glad to hear that