Install OPNsense in Proxmox: A Complete Step-by-Step Guide

OPNsense VM on Proxmox from scratch: download the ISO, create the VM with VirtIO, install OPNsense, configure WAN/LAN, DHCP and the web interface — then verify NAT and DNS work. 2026 guide.

Install OPNsense in Proxmox: A Complete Step-by-Step Guide

On my BOTUM infrastructure, all network filtering runs through an OPNsense VM on Proxmox. This guide covers the complete installation from scratch: ISO, VM creation, OPNsense install, WAN/LAN config, DHCP, and web interface access.

This post is part of the OPNsense Enterprise Stack series — start here if you're building from scratch.

Why OPNsense Over pfSense in 2026?

  • Modern Bootstrap/Vue.js interface — pfSense sticks to an aging PHP UI.
  • Native kernel WireGuard since OPNsense 21.7 — zero third-party plugins.
  • Weekly transparent updates — pfSense CE moves much slower.
  • Official CrowdSec plugin in Firmware > Plugins.
  • Full BSD 2-Clause license — no degraded community edition.
  • Full REST API for automation and CI/CD.
OPNsense ISO Download

Proxmox Prerequisites

  • CPU: 2 vCPUs min, 4 recommended
  • RAM: 4 GB min, 8 GB ideal
  • Storage: 32 GB SSD on local-lvm
  • NICs: 2 minimum (WAN + LAN), 3 ideal
  • Proxmox: 8.x (kernel 6.x)

Download the OPNsense ISO

cd /var/lib/vz/template/iso/
wget https://mirror.ams1.nl.leaseweb.net/opnsense/releases/24.7/OPNsense-24.7-dvd-amd64.iso.bz2
bzip2 -d OPNsense-24.7-dvd-amd64.iso.bz2
sha256sum OPNsense-24.7-dvd-amd64.iso

Create the OPNsense VM

Creating VM in Proxmox
qm create 100   --name opnsense-fw   --memory 4096 --cores 2 --cpu host   --net0 virtio,bridge=vmbr0   --net1 virtio,bridge=vmbr1   --net2 virtio,bridge=vmbr2   --ide2 local:iso/OPNsense-24.7-dvd-amd64.iso,media=cdrom   --scsi0 local-lvm:32 --scsihw virtio-scsi-pci   --boot order=ide2 --ostype other
qm start 100
Always use VirtIO — 3x better throughput vs emulated Intel E1000 under BSD.

Install OPNsense Step by Step

OPNsense Install Wizard
# Console login: installer / opnsense
# Install (UFS) → vtbd0 → Entire Disk → ~3 min
# Remove ISO before reboot:
qm set 100 --ide2 none,media=cdrom

Initial Configuration: WAN/LAN and DHCP

# Post-boot console:
# VLANs? → N  |  WAN: vtnet0  |  LAN: vtnet1
# Set LAN IP: 192.168.1.1/24 | DHCP: 100-200
# Web UI: http://192.168.1.1  root/opnsense

Access the Admin Web Interface

OPNsense Admin Interface

Connect to vmbr1, open http://192.168.1.1. Change root password immediately.

Setup Wizard: Hostname, DNS (1.1.1.1), NTP, WAN type, new root password, apply updates.

Verify: Ping, DNS, NAT

ping 192.168.1.1    # LAN gateway OK
ping 1.1.1.1        # NAT/WAN OK
curl -s ifconfig.me # Public IP — NAT confirmed
nslookup google.com # DNS OK

What's Next

  • Post 2: VLANs IoT/Work/Guest/DMZ + Zero Trust inter-VLAN rules
  • Post 3: WireGuard VPN — site-to-site + remote workers
  • Post 4: WiFi by VLAN — APs, segmented SSIDs
  • Post 5: CrowdSec + fail2ban — collaborative IDS/IPS
  • Post 6: SD-WAN with automatic LTE failover
📥 Guide PDF complet

Téléchargez ce guide en PDF pour le consulter hors ligne.

⬇ Télécharger le guide (PDF)

🚀 Aller plus loin avec BOTUM

Ce guide couvre les bases. En production, chaque environnement a ses spécificités. Les équipes BOTUM accompagnent les organisations dans le déploiement, la configuration avancée et la sécurisation de leur infrastructure. Si vous avez un projet, parlons-en.

Discuter de votre projet →
OPNsense Series 📋 Complete series →