Pare-feu virtualisé sous Hyper-V ?

We are currently considering installing an instance of pfSense on our Hyper-V R2 based server to act as a content filter, captive portal and general firewall.

Although it is usually bad practice to virtualise a firewall / gateway.. sometimes you gotta work with what you’ve got! :slight_smile:

We’ve got 2 physical NICs.. 1 Facing the internet (WAN) and 1 facing our internal LAN.

How would one go about making sure all internet access goes through the pfSense VM?

Is there a configuration that eliminates any possibility of traffic coming in on the LAN NIC bypassing the pfSense VM?

Sorry if it’s a silly question, I’m a developer by day :smiley:


Source : Server Fault…)

What Wesley said… Plus a diagram:

              +