The only solution is to put a proxy in front of pmg web interface ad doing the filtering of url from itUsing this option make available all PMG Admin Dashboard.
Would be great to find a solution to just show the spam quarantine portal to users.
The only solution is to put a proxy in front of pmg web interface ad doing the filtering of url from itUsing this option make available all PMG Admin Dashboard.
Would be great to find a solution to just show the spam quarantine portal to users.
The only solution is to put a proxy in front of pmg web interface ad doing the filtering of url from it
auto vmbr0
iface vmbr0 inet dhcp
bridge-ports enx70886b82dd62
bridge-stp off
bridge-fd 0
post-up iptables -t nat -A PREROUTING -p tcp -d 192.168.1.6 --dport 443 -j REDIRECT --to-ports 8006
post-up ip6tables -t nat -A PREROUTING -p tcp -d fd00::6 --dport 443 -j REDIRECT --to-ports 8006
-d 192.168.1.6
and -d fd00::6
to the firewall code because all the VMs were using the SSL certificate of proxmox and were giving me errors, now all the VMs are perfectly displaying their own SSL certificates.Necrobump, but kudos and thanks to @saud for this idea - I've implemented it in a more flexible (and automatic) manner in my proxmox playbook.Thank you all of you for the above code, it also helped me to switch to default port 443. I also tweaked the above code to make it easier to do it using the interfaces file
Code:auto vmbr0 iface vmbr0 inet dhcp bridge-ports enx70886b82dd62 bridge-stp off bridge-fd 0 post-up iptables -t nat -A PREROUTING -p tcp -d 192.168.1.6 --dport 443 -j REDIRECT --to-ports 8006 post-up ip6tables -t nat -A PREROUTING -p tcp -d fd00::6 --dport 443 -j REDIRECT --to-ports 8006
I added-d 192.168.1.6
and-d fd00::6
to the firewall code because all the VMs were using the SSL certificate of proxmox and were giving me errors, now all the VMs are perfectly displaying their own SSL certificates.
This will redirect any traffic on all interfaces, so it will end up breaking your VM's./sbin/iptables -F
/sbin/iptables -t nat -F
/sbin/iptables -t nat -A PREROUTING -p tcp --dport 443 -j REDIRECT --to-ports 8006
I added-d 192.168.1.6
and-d fd00::6
to the firewall code because all the VMs were using the SSL certificate of proxmox and were giving me errors, now all the VMs are perfectly displaying their own SSL certificates.
The code to automatically do this is already written, and exists at https://github.com/xrobau/ansible-proxmox-host/blob/master/roles/proxmox-base/files/fix-port-8006.sh
Simply add that as a post-up command to the interface you want to remap, and everything else is done for you. No configuration needed.
auto vmbr0
allow-hotplug vmbr0
iface vmbr0 inet dhcp
gateway 192.168.1.6
bridge-ports eno1
bridge-stp off
bridge-fd 0
post-up iptables -t nat -A PREROUTING -p tcp -d 192.168.1.6 --dport 443 -j REDIRECT --to-ports 8006
iface vmbr0 inet6 dhcp
gateway fd00::1
post-up ip6tables -t nat -A PREROUTING -p tcp -d fd00::6 --dport 443 -j REDIRECT --to-ports 8006
nft add table nat
nft 'add chain nat prerouting { type nat hook prerouting priority -100; }'
nft add rule nat prerouting tcp dport 443 redirect to 8006
nft add table ip nat
nft 'add chain ip nat prerouting { type nat hook prerouting priority -100; }'
nft 'add rule ip nat prerouting ip daddr 10.88.88.6 tcp dport { 443 } dnat 10.88.88.6:8006'
nft add table ip6 nat
nft 'add chain ip6 nat prerouting { type nat hook prerouting priority -100; }'
nft 'add rule ip6 nat prerouting ip6 daddr [fd88::6] tcp dport 443 dnat to [fd88::6] :8006'