Do not allow to use network interface for container

Feb 4, 2020
36
18
13
Hamburg, Germany
Hi,

On our system there are two ifaces vmbr0 and vmbr1

While vmbr0 send traffic to the outside, vmbr1 is the card to bound containers to.

When creating a new CT from web interface, the vmbr0 is preselected in network card.

If some does not give attention, the selected interface is wrong and packages will go outside (e.g. abuse mac packets)

To prevent that, is there any option, that vmbr0 is not shown any longer in the web management gui?

It is NO OPTION to disable vmbr0 in general, while this interface is in use for the firewall VM

Thanks for any hints

Tom
 
No, that's not possible.
However, they are sorted by name, so you could rename it.
Alternatively, you could block the containers in the firewall on vmbr0, so no packages go out.