Introduction

After installing Proxmox VE, it is important to configure the network layout correctly. This affects access to the web interface, the operation of virtual machines, and the ability to use separate internal segments for a firewall or client VMs.

This article covers a scenario where:

  1. the Proxmox server gets Internet access through the primary network interface
  2. an external bridge is created for WAN
  3. an internal bridge is created for the local network of virtual machines
  4. the host remains accessible independently of the virtual firewall

Network layout

The following setup is used in this scenario:

  • vmbr0 — the external bridge through which both the host and the firewall VM’s WAN interface access the Internet
  • vmbr1 — the internal bridge for the local network of virtual machines

The logic is as follows:

Internet
|
vmbr0
|
Proxmox host
|
OPNsense WAN
OPNsense LAN
|
vmbr1
|
Windows VM / other VMs

Step 1. Configure the external bridge vmbr0

The main idea is:

  • set the physical interface to manual mode
  • move the IP address and default route to vmbr0

Example configuration:

auto lo
iface lo inet loopback

iface enp8s0f0np0 inet manual

auto vmbr0
iface vmbr0 inet dhcp
   bridge-ports enp8s0f0np0
   bridge-stp off
   bridge-fd 0

iface enp8s0f1np1 inet manual

Replace enp8s0f0np0 with the actual name of your network interface, which you can find using:

ip a

If your network uses DHCP, iface vmbr0 inet dhcp is enough.

If you are using a static configuration, specify the following on vmbr0:

  • IP address
  • netmask
  • gateway

Configuring networking on a Proxmox VE server, server model OVE - Image 1

Step 2. Apply the configuration

After editing /etc/network/interfaces, you can apply the new settings with:

ifreload -a

If you are not fully confident in the changes, it is safer to reboot the server:

reboot

After the system comes back up, check the network configuration again:

ip a
ip r

The expected result is:

  • the IP address is assigned to vmbr0
  • the default route uses vmbr0
  • the physical interface is attached as a bridge port

Step 3. Create the internal bridge vmbr1

The internal bridge is used for the local network of virtual machines. It must not be attached to any physical network interface.

In the Proxmox web interface:

Go to Node → Network.
Click Create → Linux Bridge.

Set the following values:

  • Name: vmbr1
  • Autostart: enabled
  • Bridge ports: leave empty
  • IPv4/CIDR: leave empty
  • Gateway: leave empty

This will create an internal virtual switch.

Configuring networking on a Proxmox VE server, server model OVE - Image 2

After creating the bridge, apply the network settings.

Step 4. Make sure both bridges are available

After applying the configuration, the network list should include:

  • the physical interfaces
  • vmbr0
  • vmbr1

vmbr0 is used for external traffic.
vmbr1 is used for the internal segment between the firewall and the guest systems.

Configuring networking on a Proxmox VE server, server model OVE - Image 3

Practical use of the bridges

Later, the virtual machine interfaces are connected as follows:

  • WAN of the firewall VM → vmbr0
  • LAN of the firewall VM → vmbr1
  • Windows VM → vmbr1

This makes it possible to:

  • keep the host separate
  • avoid depending on the virtual firewall for access to Proxmox
  • build isolated internal networks

Conclusion

After configuring the network on the Proxmox host, you end up with two key zones:

  • the external bridge vmbr0
  • the internal bridge vmbr1

This setup works well with OPNsense and provides a solid foundation for building a secure infrastructure for Windows VMs and other services.