Hello,
I'm trying to figure out how to lock down my server so that it can only be administered from Tailscale. I don't have the option of putting the server behind a firewall as it's being colocated directly on public internet.
I created a "management" ipset which, as far as I can gather from other threads, will override the virtual one created for the web GUI + ssh exemptions that are invisible (in the UI). I restricted the ipset to the tailscale CGNAT ip range and enabled the firewall:
My expectation is that after doing this I would no longer be able to access the web GUI from my LAN, only through the Tailscale cgnat. But that isn't the case: I can (from other machines on the same private LAN, but not on tailscale) run
What am I missing?
I'm trying to figure out how to lock down my server so that it can only be administered from Tailscale. I don't have the option of putting the server behind a firewall as it's being colocated directly on public internet.
I created a "management" ipset which, as far as I can gather from other threads, will override the virtual one created for the web GUI + ssh exemptions that are invisible (in the UI). I restricted the ipset to the tailscale CGNAT ip range and enabled the firewall:
Code:
$ cat /etc/pve/firewall/cluster.fw
[OPTIONS]
enable: 1
[IPSET management]
100.64.0.0/10 # tailscale
[RULES]
IN ACCEPT -p tcp -dport 22 -log nolog # ssh
IN ACCEPT -source +dc/management -log nolog # tailscale management
My expectation is that after doing this I would no longer be able to access the web GUI from my LAN, only through the Tailscale cgnat. But that isn't the case: I can (from other machines on the same private LAN, but not on tailscale) run
curl --insecure https://192.168.0.86:8006/
just fine.What am I missing?