I am two steps away from everything working. After getting a better understanding of openvswitch, I finally have pfSense nearly working with traffic moving between VLANs and other things as well. The one issue that I can seem to solve is accessing the PVE management interface. Initially, I set the IP address of the PVE host to 192.168.10.250, so when the host boots and starts the pfSense VM, the address would be in the same VLAN as all of my other management interfaces. For some reason there is was no joy going that route. On the PVE host, I would not able to ping another of the other hosts in the LAN, and I was not able to get out over the internet.
I created an ovs IntPort VLAN with an IP address of 192.168.200.250, I also defined the VLAN in pfSense as well. After a reboot, I was able to ping all of my other hosts on the LAN as well as resolve names as well. From my laptop, I was able to ping the PVE host, but when I attempted to ssh or access the PVE management interface the connection fails. I thought I could access the web interface though my vmbr1 interface (which is a linux bridge pulled into my DSL router), again, I can ping the PVE host, but am not able to ssh or access the web interface.
I used nmap and see that the ports 22 and 8006 are filtered:
I have the PVE firewall disabled on the pfSense VM, but should I activate the firewall and create rules from ssh and https access? I am at a loss, so any suggestions would be greatly appeciated!
I created an ovs IntPort VLAN with an IP address of 192.168.200.250, I also defined the VLAN in pfSense as well. After a reboot, I was able to ping all of my other hosts on the LAN as well as resolve names as well. From my laptop, I was able to ping the PVE host, but when I attempted to ssh or access the PVE management interface the connection fails. I thought I could access the web interface though my vmbr1 interface (which is a linux bridge pulled into my DSL router), again, I can ping the PVE host, but am not able to ssh or access the web interface.
I used nmap and see that the ports 22 and 8006 are filtered:
Code:
[kcc@elite ~]$ nmap -p 22 pve
Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-01 09:21 CDT
Nmap scan report for pve (192.168.200.250)
Host is up (0.018s latency).
rDNS record for 192.168.200.250: vserver.local.lan
PORT STATE SERVICE
22/tcp filtered ssh
Nmap done: 1 IP address (1 host up) scanned in 0.25 seconds
[kcc@elite ~]$ nmap -p 8006 pve
Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-01 09:21 CDT
Nmap scan report for pve (192.168.200.250)
Host is up (0.015s latency).
rDNS record for 192.168.200.250: vserver.local.lan
PORT STATE SERVICE
8006/tcp filtered wpl-analytics
Nmap done: 1 IP address (1 host up) scanned in 0.25 seconds
I have the PVE firewall disabled on the pfSense VM, but should I activate the firewall and create rules from ssh and https access? I am at a loss, so any suggestions would be greatly appeciated!
Last edited: