Building a secure network segmentation using pfSense with WAN, LAN, and DMZ on VMware Workstation. Includes firewall rules, GeoIP filtering, and Suricata inline IPS for deep packet inspection.
In this project, I designed a segmented and secure network using pfSense as the core firewall/router. The environment was virtualized using VMware Workstation, and I relied on three virtual NICs for proper interface isolation, since VLAN tagging isn’t fully supported in this hypervisor.
I wanted to simulate what a real SMB firewall configuration might look like if done right, even in a basic lab setup.
The goal was to build a realistic home or SMB firewall topology featuring strong zone separation, GeoIP filtering, and Suricata in inline IPS mode for active threat prevention.
Network segmentation is critical to isolate zones of trust and limit lateral movement. It allows you to:
Hypervisor: VMware Workstation
Firewall: pfSense Community Edition
Virtual NICs:
Interfaces on pfSense:
Test VMs:
192.168.218.1/24
192.168.218.100 - 192.168.218.200
192.168.40.1/24
192.168.40.100 - 192.168.40.200
To limit inbound access to the DMZ, I used pfBlockerNG with GeoIP blocking to allow only selected countries.
Steps:
In my case I will be blocking any inbound and outbound traffic to Russia.
To test this we will go to the popular Russian website: yandex.ru
Before
After
I enabled Suricata in inline IPS mode directly on pfSense to inspect and drop malicious traffic.
Setup Highlights:
Note: Suricata defaults to WAN, but that creates a lot of noise. Since pfSense already blocks unsolicited inbound traffic on WAN, Suricata would just log endless scans on closed ports—burning CPU for little value. That’s why I enabled it on the LAN/DMZ interfaces instead, where it can inspect actual allowed traffic.
Testing & Results:
curl -d 'uid=0(root)'
to internal services triggered GPL ATTACK_RESPONSE id check returned root → [DROP logged]This pfSense project lays the foundation. Here’s how I plan to expand it:
This project demonstrates a realistic deployment of pfSense as a firewall with clear network segmentation and secure policy enforcement. Even without VLAN tagging, zone isolation was achieved with multiple NICs and enforced strict traffic filtering. GeoIP filtering and inline Suricata IPS further tightened the perimeter.
It’s a strong foundation for extending toward a full-blown network security lab.