Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Virtualized pfSense behind Physical pfSense

    Scheduled Pinned Locked Moved Firewalling
    10 Posts 4 Posters 860 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W Offline
      wasim.ahmed
      last edited by

      I have an environment with 2 WAN coming into a physical pfSense which serves few physical servers and virtual machines. Attached is a picture of 2 possible scenarios. First one All VMs connects to internet via physical pfSense acting as Gateway. 2nd scenario a pfSense VM acting as gateway. The requirement is each subnet should not be able to see each other at all should somebody in any subnet VM break out of the VM. Any suggestions/comments which one would be better all around?
      pfsense-vm-physical.PNG
      pfsense-vm-physical.PNG_thumb

      1 Reply Last reply Reply Quote 0
      • KOMK Offline
        KOM
        last edited by

        As much as I prefer to run pfSense virtualized, I see no reason why you need a double-NAT configuration just for subnet isolation.

        1 Reply Last reply Reply Quote 0
        • W Offline
          wasim.ahmed
          last edited by

          @KOM:

          As much as I prefer to run pfSense virtualized, I see no reason why you need a double-NAT configuration just for subnet isolation.

          Maybe I am over thinking this. But my thinking was to hide the actual IP info of the VMs from the edge firewall. I can port forward from the physical to virtual firewall WAN interface and from VM pfsense LAN to VMs. That way if the physical internet facing pfsense gets compromised they won't know the IPs of any VMs. Being too paranoid?

          1 Reply Last reply Reply Quote 0
          • KOMK Offline
            KOM
            last edited by

            Being too paranoid?

            If they've already cracked your network by taking over a forwarded host, it's game over for that network.  They can easily discover other clients via probes.  If you have a front-facing server, put it on its own interface or VLAN and isolate it via firewall rules.  This is very easy to do virtualized.

            1 Reply Last reply Reply Quote 0
            • W Offline
              wasim.ahmed
              last edited by

              I should have made it a little clearer in my earlier explanation. You just mentioned what I am really trying to achieve. I do use vLAN extensively. There are 7 vLANs right now on the network and physical pfsense is aware of all of them. So my thinking process was put all the vLAN interfaces on virtual pfsense and have physical pfsense only talk to the vm pfsense over a single LAN. That way physical pfsense has no info on any vLANs on the network. Am I thinking right?

              1 Reply Last reply Reply Quote 0
              • GrimsonG Offline
                Grimson Banned
                last edited by

                @symmcom:

                Being too paranoid?

                Yes. The RFC1918 space isn't very large and can be scanned in a matter of minutes, so you can't really hide anything here.

                @symmcom:

                That way physical pfsense has no info on any vLANs on the network.

                And what is that supposed to do? If someone can take over the first pfSense instance then the second one won't be a problem either.

                1 Reply Last reply Reply Quote 0
                • W Offline
                  wasim.ahmed
                  last edited by

                  Looks like my plan not gaining any points here.  :D

                  That's why I am asking the community. So if I am understanding it right, by creating a VM pfsense behind a physical one, I am only creating extra unnecessary micromanagement work. The physical pfsense will provide the same level of isolation whether it is with VLAN or not.
                  So I should focus 100% on the physical pfsense and load up with packages such as pfblocker, suricata etc etc and pay very close attention to the rules. Correct?

                  1 Reply Last reply Reply Quote 0
                  • KOMK Offline
                    KOM
                    last edited by

                    by creating a VM pfsense behind a physical one, I am only creating extra unnecessary micromanagement work

                    Yes.

                    So I should focus 100% on the physical pfsense and load up with packages such as pfblocker, suricata etc etc and pay very close attention to the rules. Correct?

                    That will work.  I still prefer a virtualized instance.  Snapshots can be a life-saver if an upgrade or package install goes wrong.

                    1 Reply Last reply Reply Quote 0
                    • N Offline
                      northy
                      last edited by

                      @KOM:

                      I see no reason why you need a double-NAT configuration just for subnet isolation.

                      I Do

                      Scenario:- DMZ with public facing servers and a IPS/IDS solution integrated inside the DMZ to catch/block inbound connections before reaching the internal firewall

                      :)

                      1 Reply Last reply Reply Quote 0
                      • KOMK Offline
                        KOM
                        last edited by

                        That's not double-NAT.  A double-NAT is two routers in a row that each perform address translation.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.