Do you have MX record pointing to your zimbra for incoming email? If yes, you need to replace it with PMG.
If you use PMG as outgoing server as well, need to update SPF record too.
@Spirog, if you confirm your PVE is no longer require iptables then it is ok to remove it.
I would recommend test out iptables first with fail2ban. If iptables work then u can remove nftables since u just install it recently.
@Spirog , you can remove iptables using command apt-get remove iptables. But pls make sure there is no others application using iptables before removing it.
Btw, as mention before fail2ban work with iptables by default. So unless you are very sure to remove iptables, I would recommend try to...
@Spirog , follow step 6 to enable recidive filter, customize it base on your requirement.
Below are default recidive setting from /etc/fail2ban/jail.conf. It will ban recurrent IP hit with in 1 day for 1 week.
[recidive]
logpath = /var/log/fail2ban.log
banaction = %(banaction_allports)s...
@Spirog if your PVE use iptables instead of nftables, just ignore step 2 as fail2ban use iptables by default.
Configure step 4 to use pvedaemon instead of pmgdaemon.
Try wrongly log in your pve web and run command tail -f /var/log/fail2ban.log to view fail2ban in action or error.
@Spirog, follow https://pve.proxmox.com/wiki/Fail2ban to setup for PVE.
Double check PVE is using iptables or nftables and adjust the filter accordingly.
Have you provide the full log? pmg-smtp-filter should show the mail filter rule which have process the mail delivery as example below.
Dec 9 13:17:00 mail pmg-smtp-filter[31674]: 3C148E61B2481949054: accept mail to <cartera@mydomain.com> (E90AD3C14AD) (rule: default-accept)
Dec 9 13:17:00 mail...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.