Forum Discussion
OPNSense nested in a Proxmox VM, trying to spoof VM NIC to transparently relay to host NIC
The host configuration is:
– eth0
– vmbr0 with eth0 assigned to it
iface eth0 inet manual
auto vmbr0
iface vmbr0 inet manual
bridge-ports eth0
bridge-stp off
bridge-fd 0
The guest configuration is:
– VirtIO NIC attached to vmbr0, with MAC overridden using same address as the eth0
– Firewall: NO
– MAC Filter: NO
Running dhclient on eth0 or vmbr0 correctly discovers and assigns an IP address.
Now, I am trying to get the OPNSense in a VM to get that IP address instead and to relay its traffic via the vmbr0 transparently outside of the host. I have done something very similar previously between OpenWRT running in a VM and another VM, using OpenWRT's "trivial relay" (kmod-trelay, see https://forum.openwrt.org/t/howto-kmod-trelay/49610/2, also https://github.com/openwrt/openwrt/commit/c3bba7f8c61ee98265bcffef8ee86e22aa89bbe9), and despite that this particular case is much simpler, I can't get the VM to communicate with the ISP properly. I tried simply by spoofing the eth0's MAC address by setting the OPNSense VM's interface to it, but that's not enough.
I also checked the traffic on both ends using tcpdump, and, interestingly, vmbr0 does see the DHCP requests coming from the VM, and the ISP does respond, but that response never reaches the VM, nor the tap interface corresponding to the VM that Proxmox assigned to the bridge.
What am I missing here?
1 Reply
Try this:
- Use routed/NAT mode instead of transparent bridging
- Give OPNSense a private IP on the Proxmox bridge.
- Configure NAT or policy‑based routing on OPNSense to send traffic out via the host’s Azure NIC.
- This is the most reliable pattern in Azure.
- Use an internal subnet + UDRs
- Place your workload VMs behind OPNSense on an internal Proxmox bridge.
- Assign OPNSense a private IP on that bridge and another on vmbr0.
- Route all workload traffic through OPNSense, which then NATs to the Azure NIC.
- DHCP relay instead of direct lease
- Don’t try to have OPNSense pull the Azure‑assigned public IP directly.
- Let the host keep the Azure IP, and configure OPNSense to relay or NAT traffic through it.
- Use Azure‑supported NVAs
- Azure’s supported pattern for firewalls/routers is to deploy them as NVAs (network virtual appliances) with their own NICs and UDRs, not by spoofing the host NIC.
- If you want OPNSense to be the gateway, treat it like an NVA: give it its own NIC, and use Azure routing to send traffic through it.