In most cases where IPs are routed through the PVE host, the bridge-nf-call-* settings do not need to be enabled for PVE Firewall to work.
However, we have recently switched to using a vlan-aware bridge on the host and configure the VLAN ID directly in Proxmox for each container/VM interface.
This is quick and easy with vRack (OVH) or vSwitch (Hetzner).
Because of a file
I couldn't trace that file to any package (via
It would be helpful to know where these settings are coming from and to document their existence if they come from Proxmox. Maybe Proxmox should check for their values, knowing that in some setups the firewall just won't work.
However, we have recently switched to using a vlan-aware bridge on the host and configure the VLAN ID directly in Proxmox for each container/VM interface.
This is quick and easy with vRack (OVH) or vSwitch (Hetzner).
Because of a file
/etc/sysctl.d/pve.conf
containing the following, the firewall rules didn't apply to guests in this setup.
Code:
net.bridge.bridge-nf-call-ip6tables = 0
net.bridge.bridge-nf-call-iptables = 0
net.bridge.bridge-nf-call-arptables = 0
net.bridge.bridge-nf-filter-vlan-tagged = 0
fs.aio-max-nr = 1048576
I couldn't trace that file to any package (via
apt-file search pve.conf
) and I'm not sure if it's dropped by the PVE installer or an "addon" from the way OVH and Hetzner install Proxmox automatically.It would be helpful to know where these settings are coming from and to document their existence if they come from Proxmox. Maybe Proxmox should check for their values, knowing that in some setups the firewall just won't work.