Network
Network
This guide outlines how the network topology is structured within the homelab infrastructure, which is powered by Proxmox VE, OPNsense, Nginx Reverse-Proxy, and Cloudflare Tunnel.
Overview
The Proxmox homelab uses a virtualized network to segment the main network into three subnets:
- WAN: 192.168.1.0/24
- LAN: 10.10.1.0/24
- DMZ: 10.10.200.0/24
An OPNsense virtual firewall routes and filters traffic between these networks, enabling secure connectivity and isolation.
Topology Components
Proxmox VE Host
- An open-source bare-metal virtualization platform — a homelaber’s bread and butter.
- Provides virtual bridges (
vmbr0
,vmbr1
,vmbr2
). The machines on these bridges will be assigned according to the configurations in OPNsense. These bridges are connected to the OPNsense router as network interfaces. The traffic will be filtered and managed by the OPNsense virtual router and firewall.
Virtual Bridges (vmbr)
- vmbr0 – WAN bridge connected to the router (
192.168.1.0/24
) - vmbr1 – LAN bridge for internal VMs (
10.10.1.0/24
) - vmbr2 – DMZ bridge for exposed services (
10.10.200.0/24
)
OPNsense Firewall (VM)
- Interfaces:
- net0 (WAN): Connected to
vmbr0
- net1 (LAN): Connected to
vmbr1
- net2 (DMZ): Connected to
vmbr2
- net0 (WAN): Connected to
- Handles inter-VLAN routing, NAT, firewall rules, SIEM integration, and VPN access.
Internal VMs
- Parrot Desktop VM
- Connected to LAN via
vmbr1
- Connected to LAN via
- Nginx-Reverse-Proxy Server
- Connected to DMZ via
vmbr2
- Connected to DMZ via
External Network
Router
- Default Gateway:
192.168.1.1
- Provides internet access for the Proxmox host and OPNsense WAN interface.
External Access
- Devices on the
192.168.1.1/24
subnet can access the OPNsense WAN. - Cloudflare Tunnel provides full-tunnel private access. This helps integrate the instances directly into the Cloudflare network. This will later help resolve the DNS query to the instance where
Nginx-Reverse-Proxy
is hosted.
Full-Tunnel (Cloudflare)
- Full-tunnel routes traffic from the Cloudflare network to devices through OPNsense.
- No need to set up NAT port forwarding or anything — the Cloudflare Tunnel automatically routes the traffic from configured instances to the Cloudflare network.
- Ensures encrypted remote access to the Nginx-Reverse-Proxy in the
DMZ
subnet.
Subnet Breakdown
Network | Subnet | Purpose | Bridge | Devices |
---|---|---|---|---|
WAN | 192.168.1.0/24 | External access to Internet | vmbr0 | OPNsense (WAN), Router, Proxmox |
LAN | 10.10.1.0/24 | Internal/Trusted VM network | vmbr1 | Guacamole Server & Parrot VM |
DMZ | 10.10.200.0/24 | Untrusted services | vmbr2 | Nginx-Reverse-Proxy |
★ Note
After trying out OpenWRT, pfSense, and OPNsense, I have settled on OPNsense due to its ease of use, powerful SIEM and VPN integrations, and robust firewall capabilities.
Here is a dashboard overview presented in OPNsense — easy to visualize traffic blocked and let in by the firewall.
⚠️
Portado is still in active development. Questions/Suggestions: open an issue