Tutorial Using VMWare ESXi and PFsense As A Network Firewallrouter
Tutorial Using VMWare ESXi and PFsense As A Network Firewallrouter
firewall/router
obviate.io/2015/08/31/tutorial-using-vmware-esxi-and-pfsense-as-a-network-firewallrouter
1/5
Step 3 – Select NIC
You want to select your unused NIC (assuming you only have two)
Step 4 – Name it
This is your “WAN” interface
Step 1 – New VM
Step 5 – OS Type
If you’re using PFSense, select “Other” and “FreeBSD 64bit”
2/5
Step 7 – Allocated HD
PFSense doesn’t need much space, but it should be allocated a 2:1 for swap (e.g. 4096 M
B swap file for 2048 MB of RAM), plus some extra space for packages and logs may be u
seful.
Step 9 – VM Startup
Go to Configuration > VM Startup/Shutdown
Click Properties
Section 3 – PFSense
3/5
Step 3 – Configure WAN
Again, this can be configured either via the web, or command line.
Step 5 – Test
If you’ve got the ports configured properly (i.e. WAN hardware is WAN in VMWare an
d WAN in PFSense), you should be able to connect to the internet.
There are two big questions after building a setup like this, the first is security. Since
PFSense is the host to provide an interface on the WAN, it should be the only method of
ingress into your network. With no VMware management interface on the WAN, there
should be no way for an outside party to access ESXi directly. I’ve used this setup
successfully (and safely) before, as have others. However, you always need to balance your
particular security concerns with the cost of dedicated devices.
4/5
I will note that this is the setup I use in my
home network, which doubles as my
homelab. Having a VM for a firewall gives
me a lot of flexibility, like adding an entirely
separate vSwitched network for
experimental VMs. I can also swap out the
firewall VM for another one with next to no
downtime. It also allows me to skip one
more piece of hardware at home which
would add to my otherwise hefty powerbill.
Share
0
9
0
5/5