From 13b9b0810af260a6a9a2acf4ec9a78eb29a4c782 Mon Sep 17 00:00:00 2001 From: Gitea Actions Date: Wed, 15 Oct 2025 19:27:09 +0000 Subject: [PATCH] Auto-update blog content from Obsidian: 2025-10-15 19:27:09 --- .../post/13-migration-opnsense-proxmox-highly-available.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/content/post/13-migration-opnsense-proxmox-highly-available.md b/content/post/13-migration-opnsense-proxmox-highly-available.md index 30117f1..8d30de4 100644 --- a/content/post/13-migration-opnsense-proxmox-highly-available.md +++ b/content/post/13-migration-opnsense-proxmox-highly-available.md @@ -173,4 +173,7 @@ Basically I have 2 kinds of networks, those which I trust, and those which I don Globally, on my untrusted networks, I will allow access to the DNS and to the internet. On the other hand, my trusted networks would have the possibility to reach other VLANs. -To begin I create an alias, in `Firewall` > `Aliases`, to regroup all my internal networks \ No newline at end of file +To begin, in `Firewall` > `Groups`, I create two groups to regroup my interfaces: +- **Trusted**: *Mgmt*, *User* +- **Untrusted**: *IoT*, *Lab*, *DMZ* +I create an alias, in `Firewall` > `Aliases`, to regroup all my internal networks \ No newline at end of file