Hi,
in combination with:
Will not work. So this VM will loose IP connectivity.
The question would be how to debug this further.
iptables --list
will show at no point any rules about 192.168.1.200 or .201
So the question is how to configure this properly as there must be something cruicial missing.
The available documentation at
pve_firewall_ipfilter_section
is known.
/etc/pve/nodes/<nodename>/host.fw is at no point created.
PVE version is:
pve-manager/7.2-4/ca9d43cc (running kernel: 5.15.35-1-pve)
So the goal is in general just to setup IP based and mac based anti ip spoofing.
Thank you!
Greetings
Oliver
Code:
# cat firewall/112.fw
[OPTIONS]
enable: 1
dhcp: 0
ipfilter: 1
macfilter: 1
[IPSET ipfilter-net0]
192.168.1.200
192.168.1.201
in combination with:
Code:
# cat firewall/cluster.fw
[OPTIONS]
enable: 1
policy_in: ACCEPT
root@n1:/etc/pve#
Will not work. So this VM will loose IP connectivity.
The question would be how to debug this further.
iptables --list
will show at no point any rules about 192.168.1.200 or .201
So the question is how to configure this properly as there must be something cruicial missing.
The available documentation at
pve_firewall_ipfilter_section
is known.
/etc/pve/nodes/<nodename>/host.fw is at no point created.
PVE version is:
pve-manager/7.2-4/ca9d43cc (running kernel: 5.15.35-1-pve)
So the goal is in general just to setup IP based and mac based anti ip spoofing.
Thank you!
Greetings
Oliver