Hi everyone
Sorry if my questions or terminology are a bit basic, I am starting from a low and totally self-taught knowledge base.
For fun and education I am trying different home router and server setups on a small 4 NIC embedded PC. For now I have proxmoxve hosting a pfsense VM (firewall/router) and a turnkey linux file server in a container. This works great but after I muddled my way through setup I read some blogs/comments suggesting it is unwise to have a virtualised router in the same network space as the host's management IP. This is my simple network setup:
The comments describe what is going on. vmbr1 is assigned to net0 which is the WAN interface in the pfsense VM and vmbr2 is net1 as LAN in pfsense. 192.168.1.1 is the address of the pfsense router and 192.168.1.100 is a static address outside the range that pfsense hands out on the LAN.
What I am trying to understand is whether I should remove the proxmox management IP from vmbr2 and separate it somehow. Is this better security practice? Would I use a vlan to do this and should it be a different IP range and/or subnet? If that is the right approach, how would I reach promox from a device which is on the LAN behind the pfsense router VM?
I would be very grateful for any pointers or suggestions for things I could read about this. I have spent a long time staring at the networking page of the proxmox documentation, particularly the section titled "Example: Use VLAN 5 for the Proxmox VE management IP with VLAN aware Linux bridge" but I can't quite seem to get my head around how it would map to my setup.
Sorry if my questions or terminology are a bit basic, I am starting from a low and totally self-taught knowledge base.
For fun and education I am trying different home router and server setups on a small 4 NIC embedded PC. For now I have proxmoxve hosting a pfsense VM (firewall/router) and a turnkey linux file server in a container. This works great but after I muddled my way through setup I read some blogs/comments suggesting it is unwise to have a virtualised router in the same network space as the host's management IP. This is my simple network setup:
Code:
auto lo
iface lo inet loopback
iface enp1s0 inet manual
iface enp2s0 inet manual
iface enp3s0 inet manual
iface enp4s0 inet manual
auto vmbr1
iface vmbr1 inet manual
bridge-ports enp1s0
bridge-stp off
bridge-fd 0
#pfsense WAN marked 1 on case
auto vmbr2
iface vmbr2 inet static
address 192.168.1.100/24
gateway 192.168.1.1
bridge-ports enp2s0 enp3s0 enp4s0
bridge-stp off
bridge-fd 0
#Software switch for LAN - all ports marked 2 to 4 on case. Also handles proxmoxve management, pfsense management, file server management
The comments describe what is going on. vmbr1 is assigned to net0 which is the WAN interface in the pfsense VM and vmbr2 is net1 as LAN in pfsense. 192.168.1.1 is the address of the pfsense router and 192.168.1.100 is a static address outside the range that pfsense hands out on the LAN.
What I am trying to understand is whether I should remove the proxmox management IP from vmbr2 and separate it somehow. Is this better security practice? Would I use a vlan to do this and should it be a different IP range and/or subnet? If that is the right approach, how would I reach promox from a device which is on the LAN behind the pfsense router VM?
I would be very grateful for any pointers or suggestions for things I could read about this. I have spent a long time staring at the networking page of the proxmox documentation, particularly the section titled "Example: Use VLAN 5 for the Proxmox VE management IP with VLAN aware Linux bridge" but I can't quite seem to get my head around how it would map to my setup.