I had a little discussion with a friend about setting up a firewall/gateway with visualization (no dedicated hardware for firewall!)
As I like it modular and variable, I'd set up a VM (KVM, no contianer) as firewall/gateway (shorewall), exclusively using the hardware interface connected to the outside world. proxmox itself and all VMs would only use the (virtual) interface defined as DMZ, the LAN is connected to other hardware einterfaces, exclusiveley connected to the firewall-VM.
This way the firewall can be easily replaced or completely removed, by only changing the device connections on the proxmox host.
His opinion was, the only secure way to do it, is by setting up the proxmox host itself as firewall/gateway as this is the "entry point" of all communication to the system, regardless of the direct mapping from physical interfaces to virtual interfaces at the firewall-VM...
I think this would be even less secure, because a firewall breach would imply a breach into the proxmox host. It would also make the disaster recovery more complicated, as i first have to reconstruct this host setup before restoring the VMs whereas when using a firewall-VM I only have to configure the network devices and by restoring the firewall-VM I have my DMZ/local configuration back running as it was.
What's your opinions on this?
Anyone tried both and can report on pros/cons, difficulties with configuration etc?
As I like it modular and variable, I'd set up a VM (KVM, no contianer) as firewall/gateway (shorewall), exclusively using the hardware interface connected to the outside world. proxmox itself and all VMs would only use the (virtual) interface defined as DMZ, the LAN is connected to other hardware einterfaces, exclusiveley connected to the firewall-VM.
This way the firewall can be easily replaced or completely removed, by only changing the device connections on the proxmox host.
His opinion was, the only secure way to do it, is by setting up the proxmox host itself as firewall/gateway as this is the "entry point" of all communication to the system, regardless of the direct mapping from physical interfaces to virtual interfaces at the firewall-VM...
I think this would be even less secure, because a firewall breach would imply a breach into the proxmox host. It would also make the disaster recovery more complicated, as i first have to reconstruct this host setup before restoring the VMs whereas when using a firewall-VM I only have to configure the network devices and by restoring the firewall-VM I have my DMZ/local configuration back running as it was.
What's your opinions on this?
Anyone tried both and can report on pros/cons, difficulties with configuration etc?