Kind of a continuation of this thread:
Basically what I'm trying to do is route all my internet traffic for my Host OS and VM's through my PFsense VM so that I can manage a centralised firewall and setup appropriate port forwarding as needed from my public IP addresses.
I have a hosted Windows 2012 dedicated server with 4x public IPv4's allocated to it. e.g:
101.0.102.100/29 --|--> WIN2012_HOST
101.0.102.101/29 --|
101.0.102.102/29 --|
101.0.102.103/29 --|
And a gateway of 101.0.102.199.
On the server I'm running VMware Workstation with a bunch of guest VM's including PFSense.
WIN2012_HOST
|- PFSense_VM
|- Guest1_VM
|- Guest2_VM
|- Guest3_VM
|- Guest4_VM
I setup the PFsense VM with two network interfaces; 1xWAN (Bridged with physical host interface) and 1xLAN (Virtual host-only interface) so now I have a virtual NAT'd network for my VM's.
In PFSense; I gave the WAN adapter the second spare public IP and setup the remaining 2 as 'Virtual IP's. I then enabled DHCP and in VMware added the virtual host-only interface to my other VM's to get them on the private network.
101.0.102.100/29 ----> WIN2012_HOST
101.0.102.101/29 --|--> PFSense_VM - 192.168.1.1/24
101.0.102.102/29 --| |- Guest1_VM - 192.168.1.2/24
101.0.102.103/29 --| |- Guest2_VM - 192.168.1.3/24
|- Guest3_VM - 192.168.1.4/24
|- Guest4_VM - 192.168.1.5/24
What I really want however is to end up with this:
101.0.102.100/29 --|--> PFSense_VM - 192.168.1.1/24
101.0.102.101/29 --| |- WIN2012_HOST - 192.168.1.2/24
101.0.102.102/29 --| |- Guest1_VM - 192.168.1.3/24
101.0.102.103/29 --| |- Guest2_VM - 192.168.1.4/24
|- Guest3_VM - 192.168.1.5/24
|- Guest4_VM - 192.168.1.6/24
I found a post here which is basically what I'm trying to do however it's a bit confusing so would appreciate if someone could please walk me through getting my Host OS onto my private network and routing its traffic through my PFSense VM too.
I haven't played around too much with it as I'm working over RDP any don't want to end up killing my connection however I do have KVM access if all goes too wrong.