Hi all,
I have a local Proxmox homelab with an OPNsense VM acting as firewall/router and a Kali VM behind it on an internal bridge. The WAN side of OPNsense is connected to another bridge mapped to the physical NIC. OPNsense is configured to NAT from my lab network to my home network.
I’m thinking about adding a WireGuard tunnel from OPNsense to a VPS (probably Aruba Cloud) and forcing all Kali traffic through it, mainly to avoid exposing my home IP during labs and authorized pentesting activities.
Does this setup make sense from an OPSEC perspective? Anything important I should pay attention to regarding leaks, routing, DNS, IPv6, or isolation between VMs?
Is this setup valid? I’m novice :)
[link] [comments]
from hacking: security in practice https://ift.tt/XTFoAdu
Comments
Post a Comment