diff --git a/content/post/13-migration-opnsense-proxmox-highly-available.md b/content/post/13-migration-opnsense-proxmox-highly-available.md index 050c943..610db16 100644 --- a/content/post/13-migration-opnsense-proxmox-highly-available.md +++ b/content/post/13-migration-opnsense-proxmox-highly-available.md @@ -173,8 +173,9 @@ Basically I have 2 kinds of networks, those which I trust, and those which I don Globally, on my untrusted networks, I will allow access to the DNS and to the internet. On the other hand, my trusted networks would have the possibility to reach other VLANs. -To begin, in `Firewall` > `Groups`, I create two groups to regroup my interfaces: +To begin, in `Firewall` > `Groups`, I create 3 groups to regroup my interfaces: - **Trusted**: *Mgmt*, *User* - **Untrusted**: *IoT*, *DMZ*, *Lab* +- **Internal**: *Mgmt*, *User*, *IoT*, *DMZ*, *Lab* -I create an alias, in `Firewall` > `Aliases`, to regroup all my internal networks \ No newline at end of file +Now let's create the first rule, \ No newline at end of file