This is a POLL thread in an attempt on covering all the models of firewall and Proxmox to help us better guage the future direction which we all collectively think that Proxmox should be supporting.
Assumption must be made here for brevity of your reply: you make uses of Debian 10.6 and Proxmox 6.4+. No need to indicate either Linux 4.x or 5.x (we know that bridge connection tracking got support (finally) in Linux 5.4.2).
In your reply, please indicate which approach(es) that your Proxmox setup is using as well as listing any secondary feature that you also use .
Assumption must be made here for brevity of your reply: you make uses of Debian 10.6 and Proxmox 6.4+. No need to indicate either Linux 4.x or 5.x (we know that bridge connection tracking got support (finally) in Linux 5.4.2).
In your reply, please indicate which approach(es) that your Proxmox setup is using as well as listing any secondary feature that you also use .
Approaches
- Use Proxmox firewall entirely
- CLI - pve-firewall
- PVE GUI Firewall
- Use Linux firewall entirely
- iptables in raw format
- iptables-legacy after installing nftables (you can check if your ls -l /etc/alternatives/iptables is linked to iptables-legacy)
- nft(default IP filter toolset)
- all Linux firewall types (iptables, iptables-legacy, nft)
- shorewall (CLI, Perl)
- firewalld (GUI/CLI, Python3)
- fwbuilder (GUI, C, KDE/X11)
- Mixing Proxmox and Linux firewall rules (list two or more of above options)
Secondary Supports
Analyzers
These passive (listening-only) analyzers also requires firewall settings that allows packets to be cloned (via tap interface) or redirected to by-process (PID-based) to support the following feature sets:- port scanning detection (portsentry, psad)
- intrusion detection/prevention system (IDS/IPS), (snort, suricata, Bro)
- authentication attempts/failures (fail2ban)
DBus
Often times, there will be a temporary or dynamic network device(s) coming into play and this is where D-Bus comes in and assist. Such network device would be WiFi, Ethernet-USB, proxy-port, or CAN-BUS. Some firewall tools that support D-Bus can only be used with iptables (and not nft) such as firewalld. This D-Bus approach is often not a desirable feature to have from a security vantage POV, because too many applications have access to D-Bus and today's ACLs for D-Bus access are poorly defined.DDoS
Flooding of packets (a form of distributed denial-of-servce) often requires some control feedback mechanism at firewall level into dynamically updating its ruleset that addresses such issue(s) and often for a temporary duration. fail2ban is one such package.portknockers
Simple portknocker would respond to packets arriving toward an hard-coded sequence of port numbers. Advanced portknockers now have custom port-number selector algorithms based on NTP-supplied time. fwknop-client,
Last edited: