Hello,
I am asking this in behave of a group of regular proxmox users here in Germany:
Proxmox 4 introduced web-configurable PVE firewall. It allows for configuration to be done on datacenter level, on host level and on vm level. We wanted to set up default deny based firewalling and also have iptables forward single ports to specific clients. The documentation about the pve firewall in the wiki sadly does not specify at all what the order of those rules being applied is. For example, for inbound traffic on eth0, does it first apply allow and deny rules of datacenter in configured order and then apply the host+vm specific allow+deny rules as configured? Or does it apply them the other way round or does it first apply all allow rules and then the deny rules or does it only apply one of the configured rules sets? Also, when there are other iptables rules configured on that system (for port-forwarding, ...), when do these get applied? Before/after the PVE web configured rules? All in all, we ask for some diagram of the different firewall chains and when these are applied to be added to the wiki. Another question: how are already established connections treated by the web-configured firewall?
Thanks in advance,
basisbit
I am asking this in behave of a group of regular proxmox users here in Germany:
Proxmox 4 introduced web-configurable PVE firewall. It allows for configuration to be done on datacenter level, on host level and on vm level. We wanted to set up default deny based firewalling and also have iptables forward single ports to specific clients. The documentation about the pve firewall in the wiki sadly does not specify at all what the order of those rules being applied is. For example, for inbound traffic on eth0, does it first apply allow and deny rules of datacenter in configured order and then apply the host+vm specific allow+deny rules as configured? Or does it apply them the other way round or does it first apply all allow rules and then the deny rules or does it only apply one of the configured rules sets? Also, when there are other iptables rules configured on that system (for port-forwarding, ...), when do these get applied? Before/after the PVE web configured rules? All in all, we ask for some diagram of the different firewall chains and when these are applied to be added to the wiki. Another question: how are already established connections treated by the web-configured firewall?
Thanks in advance,
basisbit
Last edited: