Right now I have a windows vm on a linux server. The vm is bridged and has it's own firewall and IP. I cannot block an IP by just adding it to the host's iptables filter as the bridged interface bypasses this.
What I want to do is make it "host only" then use the local host firewall (iptables) to forward traffic to the internal port of the host only IP - only the ports I tell it to.
Would I see any kind of performance impact doing something like this, as opposed to the way it is now?
I'm not yet sure how to do it but I'll do some research. It will have it's own IP still, just that it will route through the physical host's firewall then use the host only interface of the vm. Just want stuff to go through main firewall as it makes it easier for me to just block an IP off the entire server, if I have to.
What I want to do is make it "host only" then use the local host firewall (iptables) to forward traffic to the internal port of the host only IP - only the ports I tell it to.
Would I see any kind of performance impact doing something like this, as opposed to the way it is now?
I'm not yet sure how to do it but I'll do some research. It will have it's own IP still, just that it will route through the physical host's firewall then use the host only interface of the vm. Just want stuff to go through main firewall as it makes it easier for me to just block an IP off the entire server, if I have to.
