Jump to content













Photo
- - - - -

Custom pfSense on Azure Rm | a complete guide

  Posted by Pantelis Apostolidis , in Azure 03 January 2018 · 64 views

Custom pfSense on Azure Rm | a complete guide
A complete guide on how to create a pfSense VM on a local Hyper-V server, prepare it for Microsoft Azure, upload the disk to Azure and create a multi-NIC VM.
Download the latest image from https://www.pfsense.org/download/
Posted Image
Open Hyper-V Manager create a Generation 1 VM. I added 4096 ram, 2 cores, use VHD, add an extra NIC (for second interface) and select the downloaded ISO. (create a fixed VHD as Azure supports only fixed VHDs for custom VMs)
Posted Image
Start the VM and at the first screen press enter.
Posted Image
At all screens I accepted the default settings. Finally at the reboot prompt remove the installation ISO.
There is no need to setup VLANs, select the second interface for WAN and the first for LAN.
Posted Image
Posted Image
Once the pfSense is ready press 2 and change the LAN (hn0) interface IP to one at your network. Then select the option 14 to enable SSH.
Posted Image
Now we can login with putty, with username admin password pfsense and press 8 for Shell access.
Posted Image
The first thing is to update the packages running:

pkg upgrade
Python
Then install Python, as it is requirement for the Azure Linux Agent.
Search for Python packages running:
pkg search python
Posted Image
Install the latest Python package, setup tools and bash:
pkg install -y python27-2.7.14
pkg search setuptools

pkg install py27-setuptools-36.2.2

ln -s /usr/local/bin/python /usr/local/bin/python2.7

pkg install -y bash
Azure Linux Agent
ref: https://docs.microso...eate-upload-vhd
pkg install git

git clone https://github.com/Azure/WALinuxAgent.gi

cd WALinuxAgent

git tag

git checkout WALinuxAgent-2.1.1

git checkout WALinuxAgent-2.0.16

python setup.py install

ln -sf /usr/local/sbin/waagent /usr/sbin/waagent
check the agent is running:
waagent -Version
Posted Image
One final step before uploading the VHD to Azure is to set the LAN interface as dhcp.
This can be done by the web interface, go to https://lanaddress, login using admin / pfsense, and go to interfaces / LAN and select DHCPas ipv4 configuration.
Posted Image
Now, shutdown the pfSense and upload it to Azure Storage.
I use the Storage Explorer, https://azure.micros...orage-explorer/ a free and powerful tool to manage Azure Storage. Login to your Azure Account and press Upload. Select as Blob type: “Page blob”
https://www.e-aposto...4cc0ac27e62.png
After the upload is completed we can create a multiple NIC VM. This cannot be accomplished from GUI. We will create this using PowerShell.
$ResourceGroupName = "******"
$pfresourcegroup = "*******"
$StorageAccountName = "******"
$vnetname = "*****"
$NSGname = "******"
$location = "West Europe"
$vnet = Get-AzureRmVirtualNetwork -Name $vnetname -ResourceGroupName $ResourceGroupName
$backendSubnet = Get-AzureRMVirtualNetworkSubnetConfig -Name default -VirtualNetwork $vnet
$vmName="pfsense"
$vmSize="Standard_F1"
$vnet = Get-AzureRmVirtualNetwork -Name $vnetname -ResourceGroupName $ResourceGroupName
$pubip = New-AzureRmPublicIpAddress -Name "PFPubIP" -ResourceGroupName $pfresourcegroup -Location $location -AllocationMethod Dynamic
$nic1 = New-AzureRmNetworkInterface -Name "EXPFN1NIC1" -ResourceGroupName $pfresourcegroup -Location $location -SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pubip.Id
$nic2 = New-AzureRmNetworkInterface -Name "EXPFN1NIC2" -ResourceGroupName $pfresourcegroup -Location $location -SubnetId $vnet.Subnets[0].Id
$VM = New-AzureRmVMConfig -VMName $vmName -VMSize $vmSize
$VM | Set-AzureRmVMOSDisk `
            -VhdUri https://********.blob.core.windows.net/vhds/pfsensefix.vhd `
            -Name pfsenseos -CreateOption attach -Linux -Caching ReadWrite
$vm = Add-AzureRmVMNetworkInterface -VM $vm -Id $nic1.Id
$vm = Add-AzureRmVMNetworkInterface -VM $vm -Id $nic2.Id
$vm.NetworkProfile.NetworkInterfaces.Item(0).Primary = $true
New-AzureRMVM -ResourceGroupName $pfresourcegroup -Location $locationName -VM $vm -Verbose
Once the VM is created, go to the VM’s blade and scroll down to “Boot diagnostics”. There you can see a screenshot of the VM’s monitor.
https://www.e-aposto...4cddde2157b.png
Then go to the Networking section and SSH to the Public IP.
https://www.e-aposto...4ce2adeacc3.png
and also we can login to the Web Interface of the pfSense
https://www.e-aposto...4ce3fe0353a.png
https://www.e-aposto...4ce85fe97a1.png
In my case I have added both NICs at the same Subnet, but at a production environment add the LAN interface to the backend subnet and the WAN interface to the DMZ (public) subnet.
Of course more NICs can be added to the VM, one for each Subnet at our environment.Route external traffic through the pfSense
We cannot change the gateway at an Azure VM, but we can use routing tables to route the traffic through the pfSense.
From the Azure Portal, select New and search for Route table.
https://www.e-aposto...4ce9f90f26b.png
We need to configure two things. One is to associate the Route table to a Subnet and the second is to create a Route.
https://www.e-aposto...4ceae539c0b.png
Open the “Route table” and click the “Routes”. Press “Add route” and in order to route all outbound traffic through the pfSense then add for Address prefix “0.0.0.0”, next hop type Virtual appliance” and Net hop address the ip address of the pfSense’s LAN interface IP.
https://www.e-aposto...4cec67cf571.png
Then go to the “Subnets” and associate the required subnets.
https://www.e-aposto...4ced5dacef4.png

 

https://static.addto...save_171_16.png
The post Custom pfSense on Azure Rm | a complete guide appeared first on Apostolidis IT Corner.


Source