not quite sure what you are aiming for but if you want Ubuntu in the oracle VM to only be able to send through Tor, do the following: Step One: In the virtualbox networking section of your VM, select 'host only' Step Two: In the virtualbox manager, go to file -> preferences -> network -> [virtual adapter #] and click on the edit icon. It will show you the internal IP address of the virtual adapter, which is probably 192.168.56.1 Step Three: In your Torrc file, uncomment the line #SocksListenAddress 192.168.0.1:9100 and replace 192.168.0.1 with the internal IP address of your virtual adapter...192.168.56.1:9100 most likely is what you want Step Four: In the VM go to System -> Preferences -> Network Proxy. Select 'Manual proxy configuration' and go down to Socks host. Enter your virtual adapters internal IP address (192.168.56.1 most likely) in the address box and 9100 in the port box. Click 'Apply System-wide' and enter your root password when it asks. Click close after you have done this. From there you can configure Firefox to use Tor as normal, Tor should be listening on 127.0.0.1:9100 It seems like this is probably not what you want though. Please restate your goal in a more clear manner. I don't follow why you are restoring VM snapshots, where you are clicking Firewall or Primary, where those internal IP addresses are coming from, why you are sshing to Tor and then to privoxy which you shouldn't even be using anyway, or pretty much anything that you are saying including exactly wtf you are trying to do. are you behind a restrictive firewall and need to get around it with Tor?