Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Azure - Marketplace - Virtual Appliance pfSense environment

    Scheduled Pinned Locked Moved Virtualization
    7 Posts 3 Posters 938 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      genesis_mp
      last edited by genesis_mp

      Hi there,

      we are currently setting up our new environment in azure. So we have now the opportunity to implement a firewall in front of the virtual machines.

      pfSense has now a virtual appliance on the azure marketplace. Is it recommended to use this version?
      I had created a marketplace vm and added a secondary LAN Interface, because this is not possible in the first steps.

      We would like to have the following Azure environment:

      1x pfSense Firewall with Public IP
      1x Virtual Network with Subnet 100.100.10.0/24 -> WAN Network
      1x Virtual Network with Subnet 100.100.1.0/24 -> LAN Network
      several VM´s inside the LAN Subnet 100.100.1.0/24 but with public IP´s to reach the VM´s directly.

      All Network Traffic from LAN Network routed through the pfSense.

      My local environment:
      2x pfSense HA with 3x Subnets and 3x WAN Interfaces

      • Subnet = 10.10.10.0/24
      • Subnet = 10.10.20.0/24

      I have tested this with this resources:

      1x Virtual Network Gatway on Azure IPSEC -> Azure to Local Environment Connection

      1x Virtual Appliance with 2 NICs:

      • WAN = 100.100.10.5 (Gateway WAN = 100.100.10.1)
      • LAN = 100.100.1.5 (Gatway LAN = 100.100.1.1)

      i added a route in azure:
      0_1545144291453_d4439067-6783-4507-9673-73f49831db59-image.png

      On pfSense in Azure i can access my local network and my lan network:

      • Port test to host: 10.10.10.10 Port: 443 successful. (Local)
      • Port test to host: 100.100.1.10 Port: 3389 successful. (Azure LAN)

      On my local network i can access:

      • Port test to host: 100.100.10.5 Port: 443 successful (Azure pfSense)
      • but can´t access my LAN Network 100.100.1.10 Port: 3389 failed

      In the firewall log there are following entries:
      0_1545146436064_f181cfd1-e2c3-4488-b742-119b4c1d6216-image.png

      This is my pfSense firewall configuration:
      0_1545146602735_df92877e-3ec7-4323-b52f-b74a57a7c7ec-image.png

      I think there is a mistake which i cant see right now. Can you please help me?

      Thanks and kind regards,
      David

      1 Reply Last reply Reply Quote 0
      • GrimsonG
        Grimson Banned
        last edited by

        Stay within RFC1918 space for local networks.

        G 1 Reply Last reply Reply Quote 0
        • G
          genesis_mp @Grimson
          last edited by genesis_mp

          @grimson

          but for local network im staying in this space?

          Local Network: 10.10.10.0/16

          • Subnets: 10.10.10.0/24, 10.10.20.0/24, 10.10.30.0/24

          Azure Network: 100.100.0.0/16

          • Subnets: 100.100.10.0/24, 100.100.1.0/24, 100.100.2.0/24
          GrimsonG 1 Reply Last reply Reply Quote 0
          • GrimsonG
            Grimson Banned @genesis_mp
            last edited by

            @genesis_mp said in Azure Virtual Appliance pfsense:

            Azure Network: 100.100.0.0/16

            Nope. https://tools.ietf.org/html/rfc1918

            G 2 Replies Last reply Reply Quote 0
            • G
              genesis_mp @Grimson
              last edited by

              This post is deleted!
              1 Reply Last reply Reply Quote 0
              • G
                genesis_mp @Grimson
                last edited by

                @grimson Do you mean i have to stay in both local networks between the space? 10.0.0.0 - 10.255.255.255

                Azure and my local network?

                1 Reply Last reply Reply Quote 0
                • RicoR
                  Rico LAYER 8 Rebel Alliance
                  last edited by

                  10.0.0.0/8
                  172.16.0.0/12
                  192.168.0.0/16

                  -Rico

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.