0
votes

I need some help thinking through the security risks of exposing a VLANed VM to the internet, and some best practices advise

I would like to host a website from my home. I know the first rule of self-hosting is "don't", but I'd like to try.

This will be a dynamic site with very little expected traffic.

I was thinking of running a virtualized pfSense on a R730XD server. pfSesnse will be responsible to set up my DMZ vlan where I will host and expose a VM webserver (probably Ubuntu).

Here's what I was thinking: enter image description here

Legend:

Purple: R730XD server

Red: pfSense VM

Pink: VLAN - DMZ

Aqua: VLAN - Home Wifi

Green: VLAN - Home Wired

Notes:

  • VM-pfSense will be my nameserver and DHCP server
  • My R730XD will be pulling double duty as my NAS running ZFS with an NFS setup
  • The R730XD "Host" will get it's IP from BR2 via DHCP if I can work it, may need static IP here...
  • Other VMs hosted on R730XD will attach to BR2 as well
  • I will be firewalling my R730XD somewhat, and really lock-down "Webserver" via IPTables

So questions:

  1. is this insane?
  2. are there much better ways to do this or obvouse changes you would make?
  3. Assuming "Webserver" is basically hosting a Wiki with ports 22 & 443 exposed, scale of 1-10 how risky is this? 1 being bubble-wrapped child and 10 being FBI raids my home for being hacked and hosting nefarious things.
This question is off-topic because it is not a practical programming problem. Thus, it's not within the scope of questions appropriate for this site, as defined in What topics can I ask about here? Please also see: What types of questions should I avoid asking? You may be able to get help on another Stack Exchange site. However, be sure to read the on-topic page for the site you select prior to posting.Makyen