Rules on datacenter level apply to all nodes. Rules on node-level apply only to the node and supersede datacenter-level rules. Rules on VM level apply only to the VM and supersede the other rules.
Rules on datacenter level apply to all nodes. Rules on node-level apply only to the node and supersede datacenter-level rules. Rules on VM level apply only to the VMand supersede the other rulesand are unaffected by the datacenter and node rules (VMs are like their own separate entities).
Example:
I have a container with apache running a website on port 80, ON THE CONTAINER.
I have a NAT rule setup on the host forwarding say, port 8080 on my public IP to port 80 on my container.
I think in the above situation, you MIGHT need a rule at the DC or NODE level allowing access to port 8080. I think someone who commented on my article said that they found this to not be true though and we speculated a bit as to why.
I wrote a long article here about getting the firewall setup in Proxmox 4 (admin, please strip this if outside links aren't allowed for which I apologize. I spent a lot of time writing and didn't want to replicate the effort).
http://www.kiloroot.com/secure-prox...d-more-how-to-configure-from-start-to-finish/
like the article, nbeam - good stuff!
my questions is whether these steps in your article also apply for Proxmox VE 3.4?
Specifically asking if i should omit the ports 111 and 85 in the basic security group as they are not default in 3.4:
Proxmox VE 4.x and later port list:
Proxmox VE 3.x port list
- Web interface: 8006
- pvedaemon (listens only on 127.0.0.1): 85
- VNC Web console: 5900-5999
- SPICE proxy: 3128
- sshd (used for cluster actions): 22
- rpcbind: 111
- corosync multicast (if you run a cluster): 5404, 5405 UDP
- Web interface: 8006
- VNC Web console: 5900-5999
- SPICE console: 3128
- SSH access (only optional): 22
- CMAN multicast (if you run a cluster): 5404, 5405 UDP
thanks
We use essential cookies to make this site work, and optional cookies to enhance your experience.