Accessing Internal Network from Lan

zaibrockstar

New Member
May 6, 2021
1
0
1
37
My Network Setup

Modem->AsusRouter->PublicIp to NAT->LAN{192.168.1.1/24) -> Proxmox BareMetal {192.168.1.50/24}
->Ubuntu CT running dnsmasq for DHCP and disable systemd-resolved (10.10.10.2/24) {vmbr1}
->Ubuntu VM as Docker VM with portainer ( 10.10.10.63/24) {vmbr1}

DHCP Configuration
Code:
# /etc/dnsmasq.d/vnet
dhcp-range=10.10.10.3,10.10.10.100,12h
dhcp-option=option:dns-server,10.10.10.2

I am trying to ssh Internal VM (10.10.10.62/24) from my Lan (192.168.1.18/24) but I am not able to access it after Port forwarding. I cant seems to get why its not working.

I plan to access all my Internal services on my Lan. Please can you suggest whats missing ?

Code:
root@z:~# iptables -t nat -L -n -v
Chain PREROUTING (policy ACCEPT 1069 packets, 314K bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DNAT       tcp  --  vmbr0  *       0.0.0.0/0            0.0.0.0/0            tcp dpt:2222 to:10.10.10.63:22

Chain INPUT (policy ACCEPT 44 packets, 4423 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain OUTPUT (policy ACCEPT 7 packets, 380 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain POSTROUTING (policy ACCEPT 7 packets, 380 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 MASQUERADE  all  --  *      vmbr0   10.10.10.0/24        0.0.0.0/0


ProxMox Host /etc/network/interfaces
Code:
# /etc/network/interfaces
auto lo
iface lo inet loopback

iface eno2 inet manual

auto vmbr0
iface vmbr0 inet static
        address 192.168.1.50/24
        netmask  255.255.255.0
        gateway 192.168.1.1
        bridge-ports eno2
        bridge-stp off
        bridge-fd 0

auto vmbr1
iface vmbr1 inet static
        address  10.10.10.1
        netmask  255.255.255.0
        bridge_ports none
        bridge_stp off
        bridge_fd 0

        post-up echo 1 > /proc/sys/net/ipv4/ip_forward
        post-up   iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o vmbr0 -j MASQUERADE
        post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o vmbr0 -j MASQUERADE
       
        post-up iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 2222 -j DNAT --to 10.10.10.63:22
        post-down iptables -t nat -D PREROUTING -i vmbr0 -p tcp --dport 2222 -j DNAT --to 10.10.10.63:22
 
Last edited: