Tech Journal ‐ Milestone 3 - Peytonvt/SYS-350 GitHub Wiki
Milestone - 3: Additional Networks & Services
Overview:
- Deploy 2 New Virtual Networks (DMZ and MGMT)
- Create a VM and Deploy a Web Server
- Create and Ubuntu Backup Server
- Configure Firewall Settings and Access
VM Configuration Table:
Always select 'thin provison' when configuring storage
| VM Config | Web Server | Backup Server |
|---|---|---|
| CPU | 2 Cores | 2 Cores |
| RAM | 4GB | 5GB |
| DISK | 30GB | 30GB |
| OS | Rocky Linux 10 | Ubuntu 24.04.3 |
Create vSwitches for DMZ and MGMT:
- Add 2 Network Adapters within the ESXi host for pfX (pf14 firewall)
- Label the first DMZ and the second MGMT, create and assign port-groups.
- on pfSense machine, assign interfaces for DMZ and MGMT and configure static IP's, avoid DHCP and IPv6.
You may have to rename interfaces for a clean setup due to MAC addresses
DMZ Configuration:
DMZ: 10.0.18.x/24
Gateway 10.0.18.2
MGMT Configuration:
MGMT: 10.0.19.x/24
Gateway 10.0.19.2
Firewall Rules:
Now on pfSense's online portal, configure the following Firewall Rules,
Firewall > Rules > Edit
DMZ pfSense Rules:
Action: Pass
Interface: DMZ
Address Family: IPv4
Protocol: Any
Source: DMZ net
Destination: Any
Enabled
MGMT pfSense Rules:
Action: Pass
Interface: DMZ
Address Family: IPv4
Protocol: Any
Source: MGMT net
Destination: Any
Enabled
You will need to configure pfSense to allow MGMT and LAN to access DMZ but not the other way around. DMZ Should not be able to connect to MGMT and LAN. Set a rule to allow web ports (80,443) from anywhere to DMZ.
pfSense DMZ Rules (Top Down):

Web Server Deployment:
I used Apache and PHP for my Web Server; you can use NGINX or something similar