Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ESXi config, possible?

    Virtualization
    3
    17
    6.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      I actually run a openvpnas server in a centos VM that also holds asterisks and chat server so it would be possible to put the vpnserver inside one of your other servers just as an additional service, but its so much easier to just give it a single vCore and a little ram to a separate VM for that.  Not sure how strapped your resources are.

      But if you intend to have a single machine with ESXi installed in it, with virtual pfsense as a firewall/router handing out IPs to a couple of virtual servers, just install openvpn in pfsense and export a client to your laptop and manage things from that.

      Why is this hard?  Maybe I'm missing something.

      1 Reply Last reply Reply Quote 0
      • B
        biggsy
        last edited by

        With one NIC in the ESXi host, that's got to be your ESXi management interface and needs to be your pfSense LAN interface - just so you can configure pfSense.

        Trouble is you really want that one physical interface to be pfSense's WAN and then use OpenVPN to access and manage pfSense, ESXi and your other VMs through the tunnel.

        With two NICs it wouldn't be a problem but with one I can't see how you can make the necessary changes without locking yourself out.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          Wouldn't VLANs solve that?

          1 Reply Last reply Reply Quote 0
          • P
            phillipjm
            last edited by

            @biggsy:

            With one NIC in the ESXi host, that's got to be your ESXi management interface and needs to be your pfSense LAN interface - just so you can configure pfSense.

            Trouble is you really want that one physical interface to be pfSense's WAN and then use OpenVPN to access and manage pfSense, ESXi and your other VMs through the tunnel.

            With two NICs it wouldn't be a problem but with one I can't see how you can make the necessary changes without locking yourself out.

            Hi guys,

            Sorry been away for a few days.

            OK I actually have four physical NICs in this server! Currently only using two, NIC1: LAN, NIC2: What will be WAN. It has not been shipped to the DC yet and is sitting in my office at home.

            When it goes to the DC I do have the option of multiple IP addresses.

            This is how I have it setup so far: see Attached.

            Does this look correct? I need the VM on the DMZ to be accessible to the WAN on certain ports and I also need to map a port between the local VM and the DMZ VM for traffic.

            Thanks  :)

            Capture.JPG
            Capture.JPG_thumb

            1 Reply Last reply Reply Quote 0
            • B
              biggsy
              last edited by

              It looks like you're on the right track.  I assume that the two blacked out VMs are you web server on DMZ and back-end on LAN.

              In your original post you said that you would have to "manage via public IP Address as well". 
              Were you saying that you will only be able to connect one NIC - the WAN - once it's in the DC?

              1 Reply Last reply Reply Quote 0
              • P
                phillipjm
                last edited by

                @biggsy:

                It looks like you're on the right track.  I assume that the two blacked out VMs are you web server on DMZ and back-end on LAN.

                In your original post you said that you would have to "manage via public IP Address as well".  
                Were you saying that you will only be able to connect one NIC - the WAN - once it's in the DC?

                Yep that's right. One NIC for WAN once in the DC…
                &
                Yes the two blacked out VMs are the web server on DMZ and the back-end LAN box.

                1 Reply Last reply Reply Quote 0
                • B
                  biggsy
                  last edited by

                  OK.  I would set it up pretty much as you do already but I'd create a second DMZ and put the back-end server on that, rather than on the LAN.

                  ![2013-08-17 16-26-38.png](/public/imported_attachments/1/2013-08-17 16-26-38.png)
                  ![2013-08-17 16-26-38.png_thumb](/public/imported_attachments/1/2013-08-17 16-26-38.png_thumb)

                  1 Reply Last reply Reply Quote 0
                  • P
                    phillipjm
                    last edited by

                    good idea, thanks, biggsy!

                    1 Reply Last reply Reply Quote 0
                    • P
                      phillipjm
                      last edited by

                      Right all set up and working :) biggsy's guide is spot on!

                      Biggsy, what do you recommend for management? I know you mentioned openvpn? Is that the best / easiest option?

                      Cheers
                      Phil

                      1 Reply Last reply Reply Quote 0
                      • B
                        biggsy
                        last edited by

                        Phil,

                        OpenVPN would be my choice.  You'll just need to be sure you have set up the firewall rules to allow the client to access all the networks.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.