Post-Installation Setup
Networking
Interface attribution
For OPNsense to function properly as a router, two interfaces must be set: a WAN and a LAN. Let us create and assign these in proxmox.
- Create a Linux Bridge in Proxmox by clicking your target node, then System > Network > Create > Linux Bridge. Validate without any modification.
- Add this network interface to the OPNsense VM by clicking it, then Hardware > Add > Network Device.
- Select the new bridge you have just created and uncheck Firewall.
- Reboot the VM if needed, login as
root, and type1to enter the interface assignment menu. - Skip LAGG and VLAN setups for now.
- In WAN, type the name of the first interface according to OPNsense (it should be written in the terminal menu); and in LAN, the name of the second interface.
- Skip the next prompt and confirm changes when asked to.
- You may optionally want to setup a custom address space for your LAN and enable DHCP on it.
Note
At this point, any VM that has your new bridge as its ethernet adapter should have an IP address in the range you have configured in step 8.
Accessing the Web GUI from a device in the same network as the WAN interface
- Under Interfaces > [WAN], uncheck Block private networks.
- Under Firewall > Settings > Advanced, check Disable reply-to on WAN rules.
- Add a rule to allow traffic from the desired device:
- In Firewall > Rules > WAN, click the + button.
- Under Protocol, select TCP.
- Scroll to Source and select WAN net.
- Under Destination, select WAN address (the address of the router’s WAN interface).
- Select a Destination port range (HTTPS).
- Enter a description.
- Save and apply your rule.
User management
Enabling MFA in the web GUI
- Add an authentication server in System > Access > Servers.
- Give it a name.
- In the Type drop-down, choose Local + Timebased One Time Password.
- Tick the Reverse token order box.
- Navigate to System > Settings > Administration.
- If you have not done so by now, by all means TEST YOUR OTP (read next sections).
- Under AUthentication, add your server in the Server drop-down.
Adding an admin user
- Navigate to System > Users
- Click the + icon in the bottom right-hand corner.
- Fill out the form for regular credentials.
- Select a group, like admins.
- For a privileged user, you can enable privileges on All pages.
- If you have enabled 2FA, reveal the seed and scan it with your authenticator.
- Optionally, if you need to access the router using SSH, add an entry to Authorized Keys.
Testing MFA before validating
- Navigate to System > Tester and type you login.
- Type your password followed by the OTP given by your password manager in the same box as Password123456 (if 123456 is your OTP code).
Last updated on