Quick question for an upcoming project.
I am planning to run a pfsense vm on a proxmox host with several pcie nics passed through (the host is only going to have two vms, pfsense and a dns server).
Yes, i already looked through all the pros / cons of running it baremetal vs virtual and decided mostly for management reasons but also due to additional isolation for security reasons to go with virtual. Additionally i am planing to use a Z590 board with mostly intel nics probably two xxv710-da2 and one or two four port 2.5 or 1G nics for low speed wan.
What is the best way to isolate the pcie nics from the host in therms of security?
How to protect the host when it has the WAN facing pcie nics while the firewall vm is not running during boot?
Since there is no ip assigned to the network ports of the passed through nic in the /etc/network/interfaces the proxmox interface / ssh will obviously not be available on it, but is this enough? Technically unfiltered data packets from the internet will still arrive at the host, but just be ignored, right?
Would it increase security to disable / blacklist the drivers of the nics on the host similar to how it is done with single gpu passthough?
Is there a way to fully disable pcie devices until the vm starts up? (cut power to the pcie slots)
Thanks for any suggestions
I am planning to run a pfsense vm on a proxmox host with several pcie nics passed through (the host is only going to have two vms, pfsense and a dns server).
Yes, i already looked through all the pros / cons of running it baremetal vs virtual and decided mostly for management reasons but also due to additional isolation for security reasons to go with virtual. Additionally i am planing to use a Z590 board with mostly intel nics probably two xxv710-da2 and one or two four port 2.5 or 1G nics for low speed wan.
What is the best way to isolate the pcie nics from the host in therms of security?
How to protect the host when it has the WAN facing pcie nics while the firewall vm is not running during boot?
Since there is no ip assigned to the network ports of the passed through nic in the /etc/network/interfaces the proxmox interface / ssh will obviously not be available on it, but is this enough? Technically unfiltered data packets from the internet will still arrive at the host, but just be ignored, right?
Would it increase security to disable / blacklist the drivers of the nics on the host similar to how it is done with single gpu passthough?
Is there a way to fully disable pcie devices until the vm starts up? (cut power to the pcie slots)
Thanks for any suggestions