[TUTORIAL] Proxmox PVE+ZeroTier One + NAT


New Member
Aug 19, 2023
This is a simple way to solve routing/masquerade problems via ZeroTier One and PVE for any networking segment.

Step 0 : Install ZeroTier One

Step 1: Enable IP Forwarding at kernel level

Edit the /etc/sysctl.conf file with nano/vi/whatever and uncomment the following line:


To apply the changes immediately, run:

sysctl -p

File editing will make sure IP forwarding is enabled automatically on boot.

Step 2. Create a service file in /lib/systemd/system/zerotier-one-masquerade.service with the following contents:

Description=Enable ZeroTier One Routing
ExecStart=/bin/bash -c "iptables -t nat -A POSTROUTING ! -o lo -j MASQUERADE"

Step 3. Reload systemctl

systemctl daemon-reload

Step 4
. Enable created services

systemctl enable zerotier-one-masquerade.service

After reboot this service will automatically start after zerotier-one service.​
If you want to test/apply without reboot run​
systemctl start zerotier-one-masquerade.service

Step 5. Enjoy


0. Add needed firewall rules : THIS IS A WIDE OPEN ROUTER !
You have access to ANY NETWORK REACHABLE from PVE , be these internal or external !
1.you need to add appropriate routes on ZeroTier One controller​
2. zerotier-cli commands are not working because masquerade is global solved with " ! -o lo "
you can deactivate postrouting rule temporarily with:​
iptables -t nat -D POSTROUTING 1
and re-enable with​
systemctl start zerotier-one-masquerade.service

Last edited:


The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!