Login to vSphere Cloud Portal, go to each of the Host, select Configure > Networking > Virtual switches, click ADD NETWORKING
Select Virtual Machine Port Group for a Standard Switch

select New standard switch MTU leave as default 1500

Leave as default without Assigned adapters

Ignored this Warning as we are creating isolated private network vSwitch for Customer/Tenant without any physical network adapters, click OK to continue.

Enter network labels for new vSwitch (P.S. : This network labels must be same across all host to identify migration-compatible connections)

Click FINISH

P.S. : Repeat above step across all host.
Next, Go to PFSENSE VM template folder, right click TENANT-FW, Click New VM from This Template

Enter Virtual machine name and select BU (Business Unit) folder

Select the destination compute resource for this virtual machine (Ignored the Compatibility warning because template VM using different Network interface, the Network interface need to change after this provision)

Select the storage for this VM. (P.S. Make sure storage Free space is enough for this process)

Select clone options, check Customize this virtual machine’s hardware and Power on virtual machine after creation

After check on Customize this virtual machine’s hardware, wizard will redirect to Customize hardware page to identify resource needed for change example: CPU, RAM, HDD, Network interface and etc. For this setup CPU, RAM and HDD leave as default, Change only Network adapter 2 to new vSwitch you created for new Customer/Tenant.

Click FINISH to start creation

VM is now provisioning, you can view on Recent Tasks

Go to VM console, check on pre-set WAN IP make sure is 10.0.2.181/24

Go to web browser, make sure VPN is connected. Type default URL: https://10.0.2.181:10443/ login to PFSENSE for next configuration.
Default username: admin
Password: pfsense

You are now access to virtual firewall for next configuration

P.S.: Things to configure after complete this deployment:
1. Change WAN IP
2. Change LAN IP
3. Change Password
4. Configure Firewall rules & NAT policy