<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Virtualized pfSense behind Physical pfSense]]></title><description><![CDATA[<p dir="auto">I have an environment with 2 WAN coming into a physical pfSense which serves few physical servers and virtual machines. Attached is a picture of 2 possible scenarios. First one All VMs connects to internet via physical pfSense acting as Gateway. 2nd scenario a pfSense VM acting as gateway. The requirement is each subnet should not be able to see each other at all should somebody in any subnet VM break out of the VM. Any suggestions/comments which one would be better all around?<br />
<img src="/public/_imported_attachments_/1/pfsense-vm-physical.PNG" alt="pfsense-vm-physical.PNG" class=" img-fluid img-markdown" /><br />
<img src="/public/_imported_attachments_/1/pfsense-vm-physical.PNG_thumb" alt="pfsense-vm-physical.PNG_thumb" class=" img-fluid img-markdown" /></p>
]]></description><link>https://forum.netgate.com/topic/130084/virtualized-pfsense-behind-physical-pfsense</link><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 01:25:52 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/130084.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 24 Apr 2018 05:20:54 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 01 May 2018 13:38:49 GMT]]></title><description><![CDATA[<p dir="auto">That's not double-NAT.  A double-NAT is two routers in a row that each perform address translation.</p>
]]></description><link>https://forum.netgate.com/post/763547</link><guid isPermaLink="true">https://forum.netgate.com/post/763547</guid><dc:creator><![CDATA[KOM]]></dc:creator><pubDate>Tue, 01 May 2018 13:38:49 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Mon, 30 Apr 2018 20:41:43 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/kom">@<bdi>KOM</bdi></a>:</p>
<blockquote>
<p dir="auto">I see no reason why you need a double-NAT configuration just for subnet isolation.</p>
</blockquote>
<p dir="auto">I Do</p>
<p dir="auto">Scenario:- DMZ with public facing servers and a IPS/IDS solution integrated inside the DMZ to catch/block inbound connections before reaching the internal firewall</p>
<p dir="auto">:)</p>
]]></description><link>https://forum.netgate.com/post/763432</link><guid isPermaLink="true">https://forum.netgate.com/post/763432</guid><dc:creator><![CDATA[northy]]></dc:creator><pubDate>Mon, 30 Apr 2018 20:41:43 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 24 Apr 2018 17:53:22 GMT]]></title><description><![CDATA[<blockquote>
<p dir="auto">by creating a VM pfsense behind a physical one, I am only creating extra unnecessary micromanagement work</p>
</blockquote>
<p dir="auto">Yes.</p>
<blockquote>
<p dir="auto">So I should focus 100% on the physical pfsense and load up with packages such as pfblocker, suricata etc etc and pay very close attention to the rules. Correct?</p>
</blockquote>
<p dir="auto">That will work.  I still prefer a virtualized instance.  Snapshots can be a life-saver if an upgrade or package install goes wrong.</p>
]]></description><link>https://forum.netgate.com/post/762461</link><guid isPermaLink="true">https://forum.netgate.com/post/762461</guid><dc:creator><![CDATA[KOM]]></dc:creator><pubDate>Tue, 24 Apr 2018 17:53:22 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 24 Apr 2018 15:37:24 GMT]]></title><description><![CDATA[<p dir="auto">Looks like my plan not gaining any points here.  :D</p>
<p dir="auto">That's why I am asking the community. So if I am understanding it right, by creating a VM pfsense behind a physical one, I am only creating extra unnecessary micromanagement work. The physical pfsense will provide the same level of isolation whether it is with VLAN or not.<br />
So I should focus 100% on the physical pfsense and load up with packages such as pfblocker, suricata etc etc and pay very close attention to the rules. Correct?</p>
]]></description><link>https://forum.netgate.com/post/762432</link><guid isPermaLink="true">https://forum.netgate.com/post/762432</guid><dc:creator><![CDATA[wasim.ahmed]]></dc:creator><pubDate>Tue, 24 Apr 2018 15:37:24 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 24 Apr 2018 15:00:54 GMT]]></title><description><![CDATA[<p dir="auto">@symmcom:</p>
<blockquote>
<p dir="auto">Being too paranoid?</p>
</blockquote>
<p dir="auto">Yes. The RFC1918 space isn't very large and can be scanned in a matter of minutes, so you can't really hide anything here.</p>
<p dir="auto">@symmcom:</p>
<blockquote>
<p dir="auto">That way physical pfsense has no info on any vLANs on the network.</p>
</blockquote>
<p dir="auto">And what is that supposed to do? If someone can take over the first pfSense instance then the second one won't be a problem either.</p>
]]></description><link>https://forum.netgate.com/post/762424</link><guid isPermaLink="true">https://forum.netgate.com/post/762424</guid><dc:creator><![CDATA[Grimson]]></dc:creator><pubDate>Tue, 24 Apr 2018 15:00:54 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 24 Apr 2018 14:58:51 GMT]]></title><description><![CDATA[<p dir="auto">I should have made it a little clearer in my earlier explanation. You just mentioned what I am really trying to achieve. I do use vLAN extensively. There are 7 vLANs right now on the network and physical pfsense is aware of all of them. So my thinking process was put all the vLAN interfaces on virtual pfsense and have physical pfsense only talk to the vm pfsense over a single LAN. That way physical pfsense has no info on any vLANs on the network. Am I thinking right?</p>
]]></description><link>https://forum.netgate.com/post/762423</link><guid isPermaLink="true">https://forum.netgate.com/post/762423</guid><dc:creator><![CDATA[wasim.ahmed]]></dc:creator><pubDate>Tue, 24 Apr 2018 14:58:51 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 24 Apr 2018 14:53:08 GMT]]></title><description><![CDATA[<blockquote>
<p dir="auto">Being too paranoid?</p>
</blockquote>
<p dir="auto">If they've already cracked your network by taking over a forwarded host, it's game over for that network.  They can easily discover other clients via probes.  If you have a front-facing server, put it on its own interface or VLAN and isolate it via firewall rules.  This is very easy to do virtualized.</p>
]]></description><link>https://forum.netgate.com/post/762419</link><guid isPermaLink="true">https://forum.netgate.com/post/762419</guid><dc:creator><![CDATA[KOM]]></dc:creator><pubDate>Tue, 24 Apr 2018 14:53:08 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 24 Apr 2018 14:23:39 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/kom">@<bdi>KOM</bdi></a>:</p>
<blockquote>
<p dir="auto">As much as I prefer to run pfSense virtualized, I see no reason why you need a double-NAT configuration just for subnet isolation.</p>
</blockquote>
<p dir="auto">Maybe I am over thinking this. But my thinking was to hide the actual IP info of the VMs from the edge firewall. I can port forward from the physical to virtual firewall WAN interface and from VM pfsense LAN to VMs. That way if the physical internet facing pfsense gets compromised they won't know the IPs of any VMs. Being too paranoid?</p>
]]></description><link>https://forum.netgate.com/post/762408</link><guid isPermaLink="true">https://forum.netgate.com/post/762408</guid><dc:creator><![CDATA[wasim.ahmed]]></dc:creator><pubDate>Tue, 24 Apr 2018 14:23:39 GMT</pubDate></item><item><title><![CDATA[Reply to Virtualized pfSense behind Physical pfSense on Tue, 24 Apr 2018 13:41:59 GMT]]></title><description><![CDATA[<p dir="auto">As much as I prefer to run pfSense virtualized, I see no reason why you need a double-NAT configuration just for subnet isolation.</p>
]]></description><link>https://forum.netgate.com/post/762396</link><guid isPermaLink="true">https://forum.netgate.com/post/762396</guid><dc:creator><![CDATA[KOM]]></dc:creator><pubDate>Tue, 24 Apr 2018 13:41:59 GMT</pubDate></item></channel></rss>