pfSense Installation
Click on
on the top right of the screen

Fill the form with the name of the VM pfSense-infraSI and click Next

Select the pfSense .iso image and click Next

Click Next

Select the disk in which install it and the size of the partition 32GiB and click Next

Select the number of CPUs to allocate: 1 CPU with 2 cores and click Next

Select the RAM to allocate: 2048MB and click Next

Select the first network interface: vmbr0 (WAN interface) and click Next

Confirm the creation of the pfSense VM

Click on the newly created VM and then click on the tab Hardware

Click on Add and then on Network Device and select the Bridge vmbr4 dedicated to the DMZ network then click on the Add button

Repeat the process with the Bridge vmbr5 dedicated to the LAN network with the VLANs

Here is the result

Click on
and then on 
Then the VM will boot and the installer will start. Accept the license and rights

Press on Enter to begin the installation

Accept the default partitioning option Auto (ZFS)

Press Enter to begin the installation

Press Enter to accept the default Stripe mode

Press Space to select the disk and then Enter to go on

Select Yes and press Enter

Then, the installation will begin

When finished, accept to reboot the VM

While rebooting, you can remove the .iso image editing the CD/DVD Drive in the Hardware section

When the VM has rebooted, some basic configuration will be done in the command line interface.
For the VLANs, type n for the moment (they will be created in the web interface)

Type vtnet0 for the WAN interface, vtnet1 for the LAN and vtnet2 for the OPT1

Confirm the network interface configuration

Now the installation is complete. The rest of the configuration will be done on the web interface.

Open the browser and go to pfSense's web interface. Accept the warning to continue.

Then log in the web configurator with the default credentials (admin - pfsense)

The first thing to do when signing in the web configurator is to follow a setup wizard. Click on Next

Type pfsense in lowercase for the hostname and infrasi.lan for the domain name, then click on Next

Select the timezone Europe/Paris for the NTP configuration

Keep the WAN interface set on DHCP and uncheck the Block RFC1918 Private Networks and Block bogon networks rules and click on Next



For the LAN interface, type the static IP address 172.16.0.1 and the subnet mask 29 to allow 6 hosts for the moment. It will be easily upscaled afterwards. Then click on Next

Type a new password and confirm it. Click on Next

Click on Reload to accept and apply the new configurations.

Click on Finish

Accept the license and right.

Go to System > Advanced and change the web configurator port to 12345 to free the HTTPS port.

If you want, you can go to System > General Setup to change the CSS theme of the web configurator

Go to VPN > OpenVPN in the Wizard tab and click Next

Fill the form with the following values and click on Add new CA

Then click on Add new Certificate

Fill the form with the following values and click on Create new Certificate

Fill the form with the following values and click on Next



Check the two rules to allow access from wherever to pass through the VPN tunnel and click on Next

Click on Finish to save and apply the OpenVPN Server

Go to System > User Manager and click on Add

Fill the form with the following values and click on Save

Go to System > Package Manager > Available Packages and search for openvpn, then on the package named openvpn-client-export click on Install and Confirm

Wait for the installation to finish


Go to VPN > OpenVPN > Client Export and at the bottom of the page, you can download the exact configuration to connect to the Admin-VPN.

After downloading the configuration (I chose Inline Configuration > Most Clients), you can access it.

Now that the connection exists, we can easily use it with the command nmcli

Now we can access the web configurator using the VPN, and we can see our current connection with the OpenVPN widget in the dashboard

Go to Interfaces > Assignments > VLANs and click on Add

Choose the vtnet2 interface (OPT1) and set the VLAN at 10 describing it as Internal Services and click on Save

Then do the same for the Clients VLAN, with value 20 on the same network interface

Go back to Interfaces > Assignments and set OPT1 as VLAN10 and add a new OPT2 as VLAN20 and click on Save

Then go to Interfaces > LAN, Interfaces > OPT1 and Interfaces > OPT2 to change their names with DMZ, Services and Clients, check the option Enable interface if it's not checked already and assign a Static IP address if it's not set up already.
| Interface | IP address |
|---|---|
| DMZ | 172.16.0.1 / 29 |
| Services (VLAN 10) | 172.17.0.1 / 28 |
| Clients (VLAN 20) | 172.18.0.1 / 27 |


Go to System > Advanced > Networking to enable KEA DHCP instead of the deprecated ISC DHCP

Go to Services > DHCP Server to configure the DHCP Server on each interface as following
| Interface | Starting IP | Ending IP |
|---|---|---|
| DMZ | 172.16.0.6 | 172.16.0.6 |
| Services | 172.17.0.14 | 172.17.0.14 |
| Clients | 172.18.0.2 | 172.18.0.30 |



Create aliases
Go to Firewall > Aliases and click on New, then fill the forms with the values below and click on Save

Repeat the process for the following aliases







No Comments