Hi,
I have enabled the proxmox firewall on all levels (datacenter, proxmox host, VM, VM network adapter) and configured a rule on the VM level that drops all SSH packets (I know that traffic from the proxmox hosts should remain open, but I'll worry about that later). However, this rule has no effect, and I don't get any log entries about it (although the log levels should be set appropriately). Looking at iptables-save, I see chains that seem to define meaningful rules for packets whose destination is the bridge interface to the VM. However, SSH connections are still not blocked.
I'm attaching the (slightly redacted) output of iptables-save (the VM I'm trying to block access to has VMID 105 and IP 10.1.3.231), the VM config file, and the cluster.fw, and <VMID>.fw files. (host.fw is empty).
I have an alias for a campus LAN defined, with IP range 10.1.0.0/16. I also defined a rule on the VM level that allows and logs SSH packets from the campus LAN, and I'm also not seeing those log entries. So it seems that SSH packets never end up in the appropriate chain for filtering packets to the VM and get accepted somewhere before, but I just don't know where and why.
I'd appreciate any hints on what I'm missing here and apologize in advance for any stupidities I may have committed.
Thanks,
Telencephalon
pveversion: pve-manager/6.0-7/28984024 (running kernel: 5.0.21-1-pve)
I have enabled the proxmox firewall on all levels (datacenter, proxmox host, VM, VM network adapter) and configured a rule on the VM level that drops all SSH packets (I know that traffic from the proxmox hosts should remain open, but I'll worry about that later). However, this rule has no effect, and I don't get any log entries about it (although the log levels should be set appropriately). Looking at iptables-save, I see chains that seem to define meaningful rules for packets whose destination is the bridge interface to the VM. However, SSH connections are still not blocked.
I'm attaching the (slightly redacted) output of iptables-save (the VM I'm trying to block access to has VMID 105 and IP 10.1.3.231), the VM config file, and the cluster.fw, and <VMID>.fw files. (host.fw is empty).
I have an alias for a campus LAN defined, with IP range 10.1.0.0/16. I also defined a rule on the VM level that allows and logs SSH packets from the campus LAN, and I'm also not seeing those log entries. So it seems that SSH packets never end up in the appropriate chain for filtering packets to the VM and get accepted somewhere before, but I just don't know where and why.
I'd appreciate any hints on what I'm missing here and apologize in advance for any stupidities I may have committed.
Thanks,
Telencephalon
pveversion: pve-manager/6.0-7/28984024 (running kernel: 5.0.21-1-pve)