Comment on Feedback on Network Design and Proxmox VM Isolation

DeltaTangoLima@reddrefuge.com ⁨10⁩ ⁨months⁩ ago

Yeah, it’s definitely overkill putting each VM into its own broadcast domain. What you’re looking to achieve is known zero trust architecture (ZTA). The primary concept is that you never implicitly trust a particular piece of traffic, and always verify it instead.

The most common way I’ve seen this achieved is exactly what you’re talking about - more micro-segmentation of your network.

The design principles are usually centred around what the crown jewels are in your network. For most companies applying ZTA, that’s usually their data, especially customer data.

Ideally you create a segment that holds that data, but no processing/computer/applications. You can also create additional segments for more specific use cases if you like, but I’ve rarely seen this get beyond three primary segments: server; database; data storage.

In your case, you can either create three separate VLANs on your Proxmox cluster, with your your OPNsense firewall having an interface defined in each, or use the Proxmox firewall. I’d go the former - OPNsense is a lot more capable than the Proxmox firewall, especially if you turn on intrusion detection.

I’m not using any further segmentation beyond my VMs sitting in their own VLAN from my phsyical, but here’s a screenshot of my networking setup on Proxmox. I wrote this reply to another post here on Selfhosted, talking about how my interfaces are setup. As I said in there, it’s a bit of a headfuck getting it done, but very easy to manage once setup.

BTW, this isn’t overkill if it’s what you want to do. You’re teaching yourself some very valuable skills and, and you clearly have a natural talent for thinking both vertically and horizontally about your security. This shit is gold when I interview young techs. One of my favourite interview moments is when I ask about their home setups, and then get to see their passion ignite when they talk about it.

source
Sort:hotnewtop