virtualization and external switching

Notice: Page may contain affiliate links for which we may earn a small commission through services like Amazon Affiliates or Skimlinks.

tubs-ffm

Active Member
Sep 1, 2013
266
83
28
Hello,

Does the network setup with external switching shown below make sense? Or does it introduce unnecessary complexity?

Currently, I run my OPNsense firewall on bare metal, which I prefer. I plan to upgrade my hardware and am willing to virtualize OPNsense under Proxmox VE or XCP-ng to run some VMs on the same machine. I will use PCI passthrough for the WAN port. I had the idea of implementing PCI passthrough for the 10 GBit LAN port, including VLANs as well. This way, all internal traffic would not be affected by the virtualized switch (Linux bridge). Only traffic to the VM and to the management port would go through the virtualized switch. Essentially, the network flow would be as if the OPNsense router and the Proxmox virtualization host were two separate physical machines connected to the same physical switch.

Is this kind of setup used in practice?
Are there any reasons not to do it this way?

My question is generic. I am referring to OPNsense and Proxmox. However, you can replace these with pfSense and XCP-ng or VMware if you are more familiar with those systems.

Edit:
Not to get misunderstood, I added a second view. On the right side the external LAN traffic is going through the linux bridge of the hypervisor. On the left side the external LAN traffic is going via PCI passthrough directly to the firewall/router. Traffic to WAN and inter-vlan traffic goes out and in again the host.

virtualized switch.png
 
Last edited:

WANg

Well-Known Member
Jun 10, 2018
1,483
1,132
113
48
New York, NY
Hello,

Does the network setup with external switching shown below make sense? Or does it introduce unnecessary complexity?

Currently, I run my OPNsense firewall on bare metal, which I prefer. I plan to upgrade my hardware and am willing to virtualize OPNsense under Proxmox VE or XCP-ng to run some VMs on the same machine. I will use PCI passthrough for the WAN port. I had the idea of implementing PCI passthrough for the 10 GBit LAN port, including VLANs as well. This way, all internal traffic would not be affected by the virtualized switch (Linux bridge). Only traffic to the VM and to the management port would go through the virtualized switch. Essentially, the network flow would be as if the OPNsense router and the Proxmox virtualization host were two separate physical machines connected to the same physical switch.

Is this kind of setup used in practice?
Are there any reasons not to do it this way?

My question is generic. I am referring to OPNsense and Proxmox. However, you can replace these with pfSense and XCP-ng or VMware if you are more familiar with those systems.

View attachment 45628
So, the gist of the question is whether it’s a good idea to run your Layer 3 stuff (i.e. routing) on a router (Virtualized or not) and run your Layer 2 stuff switching) on a dedicated switch (running whatever OS that it does)? The answer is…yes. That’s how it’s generally done.
 
  • Like
Reactions: tubs-ffm