@guletz. I never said a firewall would protect you if you use a bad service configuration. And @mayhurst a firewall is basically one more step in protection. No matter what you do there is always a chance of being hacked if you have open ports. With some of the large botnets on the internet...
It's your choice but I would never put any device directly connected to the internet without some type of firewall like pfSense in front of it. If the VM is that isolated you are probably safe enough that nothing else on your network will be hacked, but I guarantee eventually that box will get...
So I'm setting up Proxmox on bare metal for the first time (been playing around with it in a VM) and I have a few questions about the best way to set it up.
One PVE Node:
Used Intel Server with two E5620 Xeon CPUs, PCIe 2.0, and SATA2
16GB ECC Memory (planning on upgrading to 32GB near end of...
@marsellus85 another option would be to put a firwall/router in a VM between your VMs and the internet. You could either use 1:1 NAT or turn off NAT to connect to each VM. If you use 1:1 NAT, you could put all the VMs on the LAN interface then use PVE's firewall to block connections between...
@mhayhurst I noticed you said you want your owncloud to directly connect to the internet with a static IP. I assume you mean a WAN IP no NAT. I would highly recommend against this. You don't want to connect your host or guests directly to the Internet.
You could put your VMs like owncloud...
If you're using ZFS as your file system you can use sanoid/syncoid for backups. ZFS has built in support for snapshots but they can quickly become a pain to manage. sanoid will automatically take snapshots on a schedule then automatically remove snapshots based upon what you configure. I.e. 2...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.