Creating Network Management Isolation

2025-04-152 min read

02 — Migrating to a Dedicated Management VLAN (VLAN 99)

Leaving management interfaces on the default VLAN is a security risk most home labs never address. In this post, I migrate Proxmox, Omada Controller, and VPN access to a dedicated VLAN 99, locking down admin access with pfSense firewall rules.

This phase documents the migration of all core management infrastructure to an isolated VLAN (VLAN 99) for improved security, network segmentation, and long-term scalability.


Goals

  • Remove critical services from the default/native VLAN
  • Assign a dedicated, isolated VLAN (VLAN 99) for:
    • Proxmox management GUI
    • Omada Controller (LXC)
  • Trunk the management VLAN through the switch to Proxmox
  • Implement firewall rules to restrict admin access
  • Preserve service availability during the transition

Pre-Migration Topology

ComponentNetworkVLANInterfaceDescription
Proxmox HostLANVLAN 1vmbr0Static IP via native VLAN
Omada ControllerLANVLAN 1vmbr0LXC container, web GUI on port 8043
Pi-holeLANVLAN 1vmbr0DNS LXC
VPN TunnelLANVLAN 1pfSenseRemote client-to-site access

Post-Migration Topology

ComponentNetworkVLANInterfaceDescription
Proxmox HostManagementVLAN 99vmbr1.99Tagged IP for GUI access via vmbr1
Omada ControllerManagementVLAN 99vmbr1 (tagged)LXC container with VLAN tag 99
Pi-holeLANVLAN 1vmbr0LXC container
Trunk Port (Switch)Trunked Port1,99,14enp1s0Connected to VLAN-aware bridge vmbr1
VPN TunnelRouted to MGMTVLAN 99pfSenseAllows external admin access to VLAN 99

Migration Steps

1. Create VLAN 99 in pfSense

  • Interfaces > Assignments > VLANs
  • Created VLAN 99 on the LAN parent interface
  • Assigned it as a new interface and renamed it to MGMT
  • Enabled the interface and set a static IP (management subnet)

2. Configure Proxmox Bridge for VLAN Tagging

Created a new VLAN-aware bridge and subinterface in /etc/network/interfaces:

hljs bash
auto vmbr1
iface vmbr1 inet manual
    bridge-ports enp1s0
    bridge-stp off
    bridge-fd 0
    bridge-vlan-aware yes
    bridge-vids 2-4094

auto vmbr1.99
iface vmbr1.99 inet static
    address <management_ip>/24
    gateway <management_gateway>