Chain PREROUTING (policy ACCEPT)
target prot opt source destination
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
MASQUERADE all -- anywhere anywhere
# pve-firewall status
Use of uninitialized value in pattern match (m //) at /usr/share/perl5/PVE/Firewall.pm line 3385.
Status: enabled/running
Is your vm 100 on vmbr1 and uses routing? Because that iptables output shows you're masquerading all traffic, both ways... which is probably not what you want. You should at least include a source address. -s 192.168.15.0/23 (Also, does that subnet of 255.255.254.0 happen to be a typo? (If so, /24 instead of /23))Code:MASQUERADE all -- anywhere anywhere
/sbin/iptables -t nat -A POSTROUTING -o vmbr0 -j MASQUERADE
# pve-firewall status
Use of uninitialized value in pattern match (m //) at /usr/share/perl5/PVE/Firewall.pm line 3385.
Status: enabled/running