Decided yesterday to update my Proxmox VE node to version 8.3.2 and realised quickly that the way forwarding traffic works has changed as Proxmox seems to have made its way to nftables as of Proxmox VE 8.3.
As outlined in the Firewall documentation, forwarded traffic is currently only possible when using the new nftables-based proxmox-firewall and any forward rules previously setup and used by pve-firewall (Proxmox's iptables-based firewall) will have no effect.
This lead to the following problem which is that for the VM's that only have a private IP (LAN), are as of this update, not able to route traffic over the Proxmox host interface which I'm using as WAN. I had used the Masquerading (NAT) with iptables configuration which no longer works with proxmox-firewall.
Long story short, I'm not familiar with nftables and need to apply the same forwarding rules with masquerading in proxmox-firewall. Specifically this part:
The postrouting should be fairly easy in nftables:
but I'm struggling getting the prerouting to work with conntrack zones which are needed for the outgoing connections. Any help is appreciated as I've been trying to get this to work for the past couple of days now.
As outlined in the Firewall documentation, forwarded traffic is currently only possible when using the new nftables-based proxmox-firewall and any forward rules previously setup and used by pve-firewall (Proxmox's iptables-based firewall) will have no effect.
This lead to the following problem which is that for the VM's that only have a private IP (LAN), are as of this update, not able to route traffic over the Proxmox host interface which I'm using as WAN. I had used the Masquerading (NAT) with iptables configuration which no longer works with proxmox-firewall.
Long story short, I'm not familiar with nftables and need to apply the same forwarding rules with masquerading in proxmox-firewall. Specifically this part:
Code:
post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
post-up iptables -t raw -I PREROUTING -i fwbr+ -j CT --zone 1
post-down iptables -t raw -D PREROUTING -i fwbr+ -j CT --zone 1
The postrouting should be fairly easy in nftables:
Code:
# Define the NAT table
table ip nat {
# Define the postrouting chain
chain postrouting {
type nat hook postrouting priority 100; policy accept;
# Masquerade rule
oifname "eno1" masquerade
}
}
but I'm struggling getting the prerouting to work with conntrack zones which are needed for the outgoing connections. Any help is appreciated as I've been trying to get this to work for the past couple of days now.
Last edited: