Hi,
Is there any way to use raw iptables rules for the VM ?
We are doing mass migration to PVE and for some of our VM we have some "special" rules that are not supported by the pve firewall.
For most of the VM we translate iptable to pve-firewall and it's working as intended but we still missing some few cases.
By the way is there any script to translate rule from iptables to pve, I've written a quick n' dirty script to do the job, but is is far from being perfect !
The main issue is that pve-firewall is not accepting name into the rule, only IP (and not a mix of ipv4 and ipv6)
ex:
iptables -A $I -p tcp --syn --dport ssh -m recent --name sshattack --set
iptables -A $I -p tcp --syn --dport ssh -m recent --name sshattack --rcheck --seconds 60 --hitcount 4 -j LOG --log-prefix '[SSH 22 REJECT] '
iptables -A $I -p tcp --syn --dport ssh -m recent --name sshattack --rcheck --seconds 60 --hitcount 4 -j DROP
iptables -A $I -p tcp --dport ssh -j ACCEPT
Is there any way to use raw iptables rules for the VM ?
We are doing mass migration to PVE and for some of our VM we have some "special" rules that are not supported by the pve firewall.
For most of the VM we translate iptable to pve-firewall and it's working as intended but we still missing some few cases.
By the way is there any script to translate rule from iptables to pve, I've written a quick n' dirty script to do the job, but is is far from being perfect !
The main issue is that pve-firewall is not accepting name into the rule, only IP (and not a mix of ipv4 and ipv6)
ex:
iptables -A $I -p tcp --syn --dport ssh -m recent --name sshattack --set
iptables -A $I -p tcp --syn --dport ssh -m recent --name sshattack --rcheck --seconds 60 --hitcount 4 -j LOG --log-prefix '[SSH 22 REJECT] '
iptables -A $I -p tcp --syn --dport ssh -m recent --name sshattack --rcheck --seconds 60 --hitcount 4 -j DROP
iptables -A $I -p tcp --dport ssh -j ACCEPT