Skip to main content
  1. Blogs/

Installing OPNsense on Proxmox

·4 mins·
Mahir
Author
Mahir
I poke at code, dig into security, and write down whatever I learn along the way.
Table of Contents

Installing OPNsense on Proxmox
#

This is a personal documentation and guide to install OPNsense firewall on Proxmox and is a part of a series of guides for my personal Proxmox Lab build.


Installation
#

Before starting I also created a linux bridge vmbr1 with VLAN aware checked and attached my secondary nicmb interface to it.

Screenshot 2026-01-07 at 7.03.04 PM.png

You can get the iso from here. I downloaded iso directly using the Proxmox GUI.

I created the VM with the following hardware and options and then attached the secondary interface before starting. The resources aren’t much because it won’t be doing any heavy tasks. I might change it in the future if required.

Note:

Proxmox will report RAM usage as max no matter how much memory you set. This is because OPNsense is FreeBSD-based, and FreeBSD memory accounting is very different from Linux

Screenshot 2026-01-07 at 8.53.17 PM.png

Remember to disable firewall in each of the Network Devices

I also enabled aes support and enabled Writeback because I’m on an SSD

Screenshot 2026-01-07 at 7.08.32 PM.png

Once created we can start the VM and run through the installer. The installer credentials are:

Username: installer , Password: opnsense

Here are the options I chose during install:

  • Default Keymap
  • Install UFS (because I’m already installing on a ZFS pool. There is no need for double ZFS)

Here it gave me warning saying live install would take at least 3000 mib but I chose to proceed anyway.

  • I selected da0 as thats the install disk

I did run into a bottleneck of ram which was expected so I recommend having 2-4 GB or ram at least for the install process and you can reduce it down later.

  • Change the root password and then finally reboot

Configuration & Temporary WAN Access
#

To configure OPNSense we need to either connect a machine to the LAN or access it from the WAN. By default WAN connections are blocked. I didn’t have a machine setup yet so I chose to disable the firewall temporarily:

Choose Option 8 for shell and login. After logging in run the following command:

pfctl -d

What this does:

  • Disables the firewall temporarily
  • Immediately allows access from WAN
  • Resets on reboot (safe)

After disabling firewall we can prepare our WAN interface and Firewall rules to allow external management.

At this point I also recommend assigning a static IPv4 to the WAN interface. In my case 10.27.27.200

Go through the setup wizard first and then change settings manually.

1. Verify Interface Assignment
#

From OPNsense console, select Option 1: Assign Interfaces

Ensure correct mapping with MAC addresses for verification:

  • WAN → Interface connected to Proxmox management network (e.g., vtnet0 with 10.27.27.200)

  • LAN → Interface for internal network (e.g., vtnet1 with 10.200.1.1)

  • If different, change it in the GUI’s Interface Assignment section.

2. Disable Private Network Blocking on WAN & Gateway Settings
#

Access OPNsense web GUI and navigate to:

Interfaces → WAN

  • ☐ Uncheck “Block private networks”
  • ☐ Uncheck “Block bogon networks”
  • Click Save and Apply Changes

Ensure your Static IPv4 Connection Settings are correct and that you have Gateway assigned.

3. Create Firewall Rule for Management Access
#

Navigate to Firewall → Rules → WAN

Configure the rule:

  • Action: Pass
  • Quick: ☑ Checked
  • Interface: WAN
  • Direction: in
  • TCP/IP Version: IPv4
  • Protocol: TCP
  • Source: 10.27.27.0/24
  • Source Port: any
  • Destination: WAN address (10.27.27.200) or This Firewall
  • Destination Port: 443 (HTTPS)

Click Save and Apply Changes

Screenshot 2026-01-07 at 9.40.49 PM.png

4. Optional: Additional Management Protocols
#

Repeat step 3 for SSH access if needed:

  • Destination Port: 22 (SSH)

That should be OPNsense configured and ready to go


DHCP Configuration
#

It is available under Services -> Dnsmasq DNS & DHCP

Under the General Tab, ensure that you explicitly define the interfaces that you want to enable DHCP for:

Screenshot 2026-01-10 at 8.10.29 PM.png

Under DHCP ranges you can configure the DHCP range:

Screenshot 2026-01-10 at 8.11.35 PM.png


VLANs and Firewall Rules
#

To add a VLAN, first add a VLAN interface:

Screenshot 2026-01-07 at 10.24.07 PM.png

Then, add the VLAN you just configured as an Interface:

Screenshot 2026-01-07 at 10.25.29 PM.png

Once added, select the VLAN interface and configure it accordingly: Screenshot 2026-01-07 at 10.32.00 PM.png

DHCP can be configured in the Services section:

Screenshot 2026-01-07 at 10.33.35 PM.png

Configure a basic rule to ensure the VLAN works:

I suggest copying the default rules from LAN interface and then applying it to the VLAN interface.

Screenshot 2026-01-10 at 7.59.44 PM.png

For VLAN DHCP Configuration refer to the DHCP Configuration Section. The steps are the same.

VLAN Tags in Proxmox
#

To use your configured VLAN ensure VLAN tagging is enabled for the interface and assign the VLAN tag.

Screenshot 2026-01-10 at 8.16.17 PM.png

Updating Firmware
#

  • You can update the firmware under System -> Firmware
  • After you’ve setup your firewall it is important to keep it up to date.

Extras
#

  • You can change the DNS servers and the theme to dark under System -> Settings -> General

Related