]> git.proxmox.com Git - pve-docs.git/blame - pve-network.adoc
network: re-add mention of ifup/down but as warning
[pve-docs.git] / pve-network.adoc
CommitLineData
80c0adcb 1[[sysadmin_network_configuration]]
0bcd1f7f
DM
2Network Configuration
3---------------------
5f09af76
DM
4ifdef::wiki[]
5:pve-toplevel:
6endif::wiki[]
7
a22d7c24 8Network configuration can be done either via the GUI, or by manually
05213009
EK
9editing the file `/etc/network/interfaces`, which contains the
10whole network configuration. The `interfaces(5)` manual page contains the
11complete format description. All {pve} tools try hard to keep direct
52e23c35 12user modifications, but using the GUI is still preferable, because it
05213009 13protects you from errors.
0bcd1f7f 14
a5604bb4
TL
15WARNING: It's discourage to use the Debian traditional tools `ifup` and `ifdown`
16if unsure, as they have some pitfalls like interupting all guest traffic on
17`ifdown vmbrX` but not reconnecting those guest again when doing `ifup` on the
18same bridge later.
19
52e23c35
TL
20Apply Network Changes
21~~~~~~~~~~~~~~~~~~~~~
22
23{pve} does not write changes directly to `/etc/network/interfaces`. Instead, we
24write into a temporary file called `/etc/network/interfaces.new`, this way you
25can do many related changes at once. This also allows to ensure your changes
26are correct before applying, as a wrong network configuration may render a node
27inaccessible.
28
29Reboot Node to apply
30^^^^^^^^^^^^^^^^^^^^
31
32With the default installed `ifupdown` network managing package you need to
33reboot to commit any pending network changes. Most of the time, the basic {pve}
34network setup is stable and does not change often, so rebooting should not be
35required often.
36
37Reload Network with ifupdown2
38^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
39
40With the optional `ifupdown2` network managing package you also can reload the
41network configuration live, without requiring a reboot.
42
52e23c35
TL
43Since {pve} 6.1 you can apply pending network changes over the web-interface,
44using the 'Apply Configuration' button in the 'Network' panel of a node.
45
46To install 'ifupdown2' ensure you have the latest {pve} updates installed, then
47
48WARNING: installing 'ifupdown2' will remove 'ifupdown', but as the removal
49scripts of 'ifupdown' before version '0.8.35+pve1' have a issue where network
50is fully stopped on removal footnote:[Introduced with Debian Buster:
51https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945877] you *must* ensure
52that you have a up to date 'ifupdown' package version.
53
54For the installation itself you can then simply do:
55
56 apt install ifupdown2
57
58With that you're all set. You can also switch back to the 'ifupdown' variant at
59any time, if you run into issues.
0bcd1f7f 60
0bcd1f7f
DM
61Naming Conventions
62~~~~~~~~~~~~~~~~~~
63
64We currently use the following naming conventions for device names:
65
05213009
EK
66* Ethernet devices: en*, systemd network interface names. This naming scheme is
67 used for new {pve} installations since version 5.0.
7a0d4784 68
05213009
EK
69* Ethernet devices: eth[N], where 0 ≤ N (`eth0`, `eth1`, ...) This naming
70scheme is used for {pve} hosts which were installed before the 5.0
71release. When upgrading to 5.0, the names are kept as-is.
0bcd1f7f
DM
72
73* Bridge names: vmbr[N], where 0 ≤ N ≤ 4094 (`vmbr0` - `vmbr4094`)
74
75* Bonds: bond[N], where 0 ≤ N (`bond0`, `bond1`, ...)
76
77* VLANs: Simply add the VLAN number to the device name,
7a0d4784 78 separated by a period (`eno1.50`, `bond1.30`)
0bcd1f7f
DM
79
80This makes it easier to debug networks problems, because the device
05213009 81name implies the device type.
cc3cb912 82
7a0d4784
WL
83Systemd Network Interface Names
84^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
85
8116dea5
DM
86Systemd uses the two character prefix 'en' for Ethernet network
87devices. The next characters depends on the device driver and the fact
cc3cb912 88which schema matches first.
7a0d4784
WL
89
90* o<index>[n<phys_port_name>|d<dev_port>] — devices on board
91
92* s<slot>[f<function>][n<phys_port_name>|d<dev_port>] — device by hotplug id
93
94* [P<domain>]p<bus>s<slot>[f<function>][n<phys_port_name>|d<dev_port>] — devices by bus id
95
96* x<MAC> — device by MAC address
97
cc3cb912 98The most common patterns are:
7a0d4784
WL
99
100* eno1 — is the first on board NIC
101
102* enp3s0f1 — is the NIC on pcibus 3 slot 0 and use the NIC function 1.
103
cc3cb912
DM
104For more information see https://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames/[Predictable Network Interface Names].
105
05213009
EK
106Choosing a network configuration
107~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
108
a22d7c24 109Depending on your current network organization and your resources you can
05213009
EK
110choose either a bridged, routed, or masquerading networking setup.
111
112{pve} server in a private LAN, using an external gateway to reach the internet
113^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
114
a22d7c24 115The *Bridged* model makes the most sense in this case, and this is also
05213009 116the default mode on new {pve} installations.
a22d7c24
SR
117Each of your Guest system will have a virtual interface attached to the
118{pve} bridge. This is similar in effect to having the Guest network card
05213009
EK
119directly connected to a new switch on your LAN, the {pve} host playing the role
120of the switch.
121
122{pve} server at hosting provider, with public IP ranges for Guests
123^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
124
125For this setup, you can use either a *Bridged* or *Routed* model, depending on
126what your provider allows.
127
128{pve} server at hosting provider, with a single public IP address
129^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
130
131In that case the only way to get outgoing network accesses for your guest
a22d7c24 132systems is to use *Masquerading*. For incoming network access to your guests,
05213009
EK
133you will need to configure *Port Forwarding*.
134
135For further flexibility, you can configure
136VLANs (IEEE 802.1q) and network bonding, also known as "link
137aggregation". That way it is possible to build complex and flexible
138virtual networks.
7a0d4784 139
0bcd1f7f
DM
140Default Configuration using a Bridge
141~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
142
50f88938 143[thumbnail="default-network-setup-bridge.svg"]
05213009 144Bridges are like physical network switches implemented in software.
e2280bf7
TL
145All virtual guests can share a single bridge, or you can create multiple
146bridges to separate network domains. Each host can have up to 4094 bridges.
05213009 147
0bcd1f7f 148The installation program creates a single bridge named `vmbr0`, which
04e8476d
EK
149is connected to the first Ethernet card. The corresponding
150configuration in `/etc/network/interfaces` might look like this:
0bcd1f7f
DM
151
152----
153auto lo
154iface lo inet loopback
155
7a0d4784 156iface eno1 inet manual
0bcd1f7f
DM
157
158auto vmbr0
159iface vmbr0 inet static
33349b9f 160 address 192.168.10.2/24
0bcd1f7f 161 gateway 192.168.10.1
7a39aabd
AL
162 bridge-ports eno1
163 bridge-stp off
164 bridge-fd 0
0bcd1f7f
DM
165----
166
167Virtual machines behave as if they were directly connected to the
168physical network. The network, in turn, sees each virtual machine as
169having its own MAC, even though there is only one network cable
170connecting all of these VMs to the network.
171
0bcd1f7f
DM
172Routed Configuration
173~~~~~~~~~~~~~~~~~~~~
174
175Most hosting providers do not support the above setup. For security
176reasons, they disable networking as soon as they detect multiple MAC
177addresses on a single interface.
178
67c9747f
TL
179TIP: Some providers allow you to register additional MACs through their
180management interface. This avoids the problem, but can be clumsy to
0bcd1f7f
DM
181configure because you need to register a MAC for each of your VMs.
182
8c1189b6 183You can avoid the problem by ``routing'' all traffic via a single
0bcd1f7f
DM
184interface. This makes sure that all network packets use the same MAC
185address.
186
50f88938 187[thumbnail="default-network-setup-routed.svg"]
05213009 188A common scenario is that you have a public IP (assume `198.51.100.5`
0bcd1f7f 189for this example), and an additional IP block for your VMs
e4682f58 190(`203.0.113.16/28`). We recommend the following setup for such
0bcd1f7f
DM
191situations:
192
193----
194auto lo
195iface lo inet loopback
196
e4682f58
DW
197auto eno0
198iface eno0 inet static
199 address 198.51.100.5/29
05213009 200 gateway 198.51.100.1
1ed90852 201 post-up echo 1 > /proc/sys/net/ipv4/ip_forward
d7a0fa2a 202 post-up echo 1 > /proc/sys/net/ipv4/conf/eno0/proxy_arp
0bcd1f7f
DM
203
204
205auto vmbr0
206iface vmbr0 inet static
e4682f58 207 address 203.0.113.17/28
7a39aabd
AL
208 bridge-ports none
209 bridge-stp off
210 bridge-fd 0
0bcd1f7f
DM
211----
212
213
8c1189b6
FG
214Masquerading (NAT) with `iptables`
215~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
0bcd1f7f 216
05213009
EK
217Masquerading allows guests having only a private IP address to access the
218network by using the host IP address for outgoing traffic. Each outgoing
219packet is rewritten by `iptables` to appear as originating from the host,
220and responses are rewritten accordingly to be routed to the original sender.
0bcd1f7f
DM
221
222----
223auto lo
224iface lo inet loopback
225
05213009 226auto eno1
470d4313 227#real IP address
7a0d4784 228iface eno1 inet static
33349b9f 229 address 198.51.100.5/24
05213009 230 gateway 198.51.100.1
0bcd1f7f
DM
231
232auto vmbr0
233#private sub network
234iface vmbr0 inet static
33349b9f 235 address 10.10.10.1/24
7a39aabd
AL
236 bridge-ports none
237 bridge-stp off
238 bridge-fd 0
0bcd1f7f 239
22d52440 240 post-up echo 1 > /proc/sys/net/ipv4/ip_forward
7a0d4784
WL
241 post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
242 post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o eno1 -j MASQUERADE
0bcd1f7f
DM
243----
244
22d52440
OB
245NOTE: In some masquerade setups with firewall enabled, conntrack zones might be
246needed for outgoing connections. Otherwise the firewall could block outgoing
247connections since they will prefer the `POSTROUTING` of the VM bridge (and not
248`MASQUERADE`).
249
250Adding these lines in the `/etc/network/interfaces` can fix this problem:
251
252----
253post-up iptables -t raw -I PREROUTING -i fwbr+ -j CT --zone 1
254post-down iptables -t raw -D PREROUTING -i fwbr+ -j CT --zone 1
255----
256
257For more information about this, refer to the following links:
217f7cd8 258
22d52440 259https://commons.wikimedia.org/wiki/File:Netfilter-packet-flow.svg[Netfilter Packet Flow]
217f7cd8 260
22d52440 261https://lwn.net/Articles/370152/[Patch on netdev-list introducing conntrack zones]
217f7cd8 262
22d52440
OB
263https://blog.lobraun.de/2019/05/19/prox/[Blog post with a good explanation by using TRACE in the raw table]
264
265
b4c06a93
WL
266
267Linux Bond
268~~~~~~~~~~
269
3eafe338
WL
270Bonding (also called NIC teaming or Link Aggregation) is a technique
271for binding multiple NIC's to a single network device. It is possible
272to achieve different goals, like make the network fault-tolerant,
273increase the performance or both together.
274
275High-speed hardware like Fibre Channel and the associated switching
276hardware can be quite expensive. By doing link aggregation, two NICs
277can appear as one logical interface, resulting in double speed. This
278is a native Linux kernel feature that is supported by most
279switches. If your nodes have multiple Ethernet ports, you can
280distribute your points of failure by running network cables to
281different switches and the bonded connection will failover to one
282cable or the other in case of network trouble.
283
284Aggregated links can improve live-migration delays and improve the
285speed of replication of data between Proxmox VE Cluster nodes.
b4c06a93
WL
286
287There are 7 modes for bonding:
288
289* *Round-robin (balance-rr):* Transmit network packets in sequential
290order from the first available network interface (NIC) slave through
291the last. This mode provides load balancing and fault tolerance.
292
293* *Active-backup (active-backup):* Only one NIC slave in the bond is
294active. A different slave becomes active if, and only if, the active
295slave fails. The single logical bonded interface's MAC address is
296externally visible on only one NIC (port) to avoid distortion in the
297network switch. This mode provides fault tolerance.
298
299* *XOR (balance-xor):* Transmit network packets based on [(source MAC
300address XOR'd with destination MAC address) modulo NIC slave
301count]. This selects the same NIC slave for each destination MAC
302address. This mode provides load balancing and fault tolerance.
303
304* *Broadcast (broadcast):* Transmit network packets on all slave
305network interfaces. This mode provides fault tolerance.
306
307* *IEEE 802.3ad Dynamic link aggregation (802.3ad)(LACP):* Creates
308aggregation groups that share the same speed and duplex
309settings. Utilizes all slave network interfaces in the active
310aggregator group according to the 802.3ad specification.
311
312* *Adaptive transmit load balancing (balance-tlb):* Linux bonding
313driver mode that does not require any special network-switch
314support. The outgoing network packet traffic is distributed according
315to the current load (computed relative to the speed) on each network
316interface slave. Incoming traffic is received by one currently
317designated slave network interface. If this receiving slave fails,
318another slave takes over the MAC address of the failed receiving
319slave.
320
e60ce90c 321* *Adaptive load balancing (balance-alb):* Includes balance-tlb plus receive
b4c06a93
WL
322load balancing (rlb) for IPV4 traffic, and does not require any
323special network switch support. The receive load balancing is achieved
324by ARP negotiation. The bonding driver intercepts the ARP Replies sent
325by the local system on their way out and overwrites the source
326hardware address with the unique hardware address of one of the NIC
327slaves in the single logical bonded interface such that different
328network-peers use different MAC addresses for their network packet
329traffic.
330
649098a6 331If your switch support the LACP (IEEE 802.3ad) protocol then we recommend using
a22d7c24 332the corresponding bonding mode (802.3ad). Otherwise you should generally use the
649098a6
EK
333active-backup mode. +
334// http://lists.linux-ha.org/pipermail/linux-ha/2013-January/046295.html
335If you intend to run your cluster network on the bonding interfaces, then you
336have to use active-passive mode on the bonding interfaces, other modes are
337unsupported.
b4c06a93 338
cd1de2c2
WL
339The following bond configuration can be used as distributed/shared
340storage network. The benefit would be that you get more speed and the
341network will be fault-tolerant.
342
b4c06a93
WL
343.Example: Use bond with fixed IP address
344----
345auto lo
346iface lo inet loopback
347
7a0d4784 348iface eno1 inet manual
b4c06a93 349
7a0d4784 350iface eno2 inet manual
b4c06a93 351
61b099f5
WL
352iface eno3 inet manual
353
b4c06a93
WL
354auto bond0
355iface bond0 inet static
5f05aad1 356 bond-slaves eno1 eno2
33349b9f 357 address 192.168.1.2/24
7a39aabd
AL
358 bond-miimon 100
359 bond-mode 802.3ad
360 bond-xmit-hash-policy layer2+3
b4c06a93
WL
361
362auto vmbr0
363iface vmbr0 inet static
33349b9f 364 address 10.10.10.2/24
7ea42266 365 gateway 10.10.10.1
61b099f5 366 bridge-ports eno3
7a39aabd
AL
367 bridge-stp off
368 bridge-fd 0
b4c06a93
WL
369
370----
371
cd1de2c2 372
50f88938 373[thumbnail="default-network-setup-bond.svg"]
cd1de2c2
WL
374Another possibility it to use the bond directly as bridge port.
375This can be used to make the guest network fault-tolerant.
376
377.Example: Use a bond as bridge port
b4c06a93
WL
378----
379auto lo
380iface lo inet loopback
381
7a0d4784 382iface eno1 inet manual
b4c06a93 383
7a0d4784 384iface eno2 inet manual
b4c06a93
WL
385
386auto bond0
470d4313 387iface bond0 inet manual
5f05aad1 388 bond-slaves eno1 eno2
7a39aabd
AL
389 bond-miimon 100
390 bond-mode 802.3ad
391 bond-xmit-hash-policy layer2+3
b4c06a93
WL
392
393auto vmbr0
394iface vmbr0 inet static
33349b9f 395 address 10.10.10.2/24
7ea42266 396 gateway 10.10.10.1
7a39aabd
AL
397 bridge-ports bond0
398 bridge-stp off
399 bridge-fd 0
b4c06a93
WL
400
401----
402
61105e42 403
94fd8ea5
WL
404VLAN 802.1Q
405~~~~~~~~~~~
406
4d8af129
DM
407A virtual LAN (VLAN) is a broadcast domain that is partitioned and
408isolated in the network at layer two. So it is possible to have
409multiple networks (4096) in a physical network, each independent of
410the other ones.
411
61105e42 412Each VLAN network is identified by a number often called 'tag'.
4d8af129
DM
413Network packages are then 'tagged' to identify which virtual network
414they belong to.
94fd8ea5 415
94fd8ea5 416
4d8af129
DM
417VLAN for Guest Networks
418^^^^^^^^^^^^^^^^^^^^^^^
94fd8ea5 419
4d8af129
DM
420{pve} supports this setup out of the box. You can specify the VLAN tag
421when you create a VM. The VLAN tag is part of the guest network
a22d7c24 422configuration. The networking layer supports different modes to
4d8af129 423implement VLANs, depending on the bridge configuration:
94fd8ea5 424
4d8af129 425* *VLAN awareness on the Linux bridge:*
94fd8ea5 426In this case, each guest's virtual network card is assigned to a VLAN tag,
4d8af129 427which is transparently supported by the Linux bridge.
a22d7c24 428Trunk mode is also possible, but that makes configuration
94fd8ea5
WL
429in the guest necessary.
430
431* *"traditional" VLAN on the Linux bridge:*
432In contrast to the VLAN awareness method, this method is not transparent
433and creates a VLAN device with associated bridge for each VLAN.
a22d7c24
SR
434That is, creating a guest on VLAN 5 for example, would create two
435interfaces eno1.5 and vmbr0v5, which would remain until a reboot occurs.
94fd8ea5 436
4d8af129
DM
437* *Open vSwitch VLAN:*
438This mode uses the OVS VLAN feature.
439
a22d7c24 440* *Guest configured VLAN:*
4d8af129
DM
441VLANs are assigned inside the guest. In this case, the setup is
442completely done inside the guest and can not be influenced from the
443outside. The benefit is that you can use more than one VLAN on a
444single virtual NIC.
445
446
447VLAN on the Host
448^^^^^^^^^^^^^^^^
94fd8ea5 449
4d8af129
DM
450To allow host communication with an isolated network. It is possible
451to apply VLAN tags to any network device (NIC, Bond, Bridge). In
452general, you should configure the VLAN on the interface with the least
94fd8ea5
WL
453abstraction layers between itself and the physical NIC.
454
455For example, in a default configuration where you want to place
456the host management address on a separate VLAN.
457
94fd8ea5 458
038dc7df 459.Example: Use VLAN 5 for the {pve} management IP with traditional Linux bridge
94fd8ea5
WL
460----
461auto lo
462iface lo inet loopback
463
464iface eno1 inet manual
465
466iface eno1.5 inet manual
467
468auto vmbr0v5
469iface vmbr0v5 inet static
33349b9f 470 address 10.10.10.2/24
94fd8ea5 471 gateway 10.10.10.1
7a39aabd
AL
472 bridge-ports eno1.5
473 bridge-stp off
474 bridge-fd 0
94fd8ea5
WL
475
476auto vmbr0
477iface vmbr0 inet manual
7a39aabd
AL
478 bridge-ports eno1
479 bridge-stp off
480 bridge-fd 0
94fd8ea5
WL
481
482----
483
038dc7df
AD
484.Example: Use VLAN 5 for the {pve} management IP with VLAN aware Linux bridge
485----
486auto lo
487iface lo inet loopback
488
489iface eno1 inet manual
490
491
492auto vmbr0.5
493iface vmbr0.5 inet static
33349b9f 494 address 10.10.10.2/24
038dc7df
AD
495 gateway 10.10.10.1
496
497auto vmbr0
498iface vmbr0 inet manual
7a39aabd
AL
499 bridge-ports eno1
500 bridge-stp off
501 bridge-fd 0
502 bridge-vlan-aware yes
a59c283b 503 bridge-vids 2-4094
038dc7df
AD
504----
505
94fd8ea5
WL
506The next example is the same setup but a bond is used to
507make this network fail-safe.
508
038dc7df 509.Example: Use VLAN 5 with bond0 for the {pve} management IP with traditional Linux bridge
94fd8ea5
WL
510----
511auto lo
512iface lo inet loopback
513
514iface eno1 inet manual
515
516iface eno2 inet manual
517
518auto bond0
519iface bond0 inet manual
5f05aad1 520 bond-slaves eno1 eno2
7a39aabd
AL
521 bond-miimon 100
522 bond-mode 802.3ad
523 bond-xmit-hash-policy layer2+3
94fd8ea5
WL
524
525iface bond0.5 inet manual
526
527auto vmbr0v5
528iface vmbr0v5 inet static
33349b9f 529 address 10.10.10.2/24
94fd8ea5 530 gateway 10.10.10.1
7a39aabd
AL
531 bridge-ports bond0.5
532 bridge-stp off
533 bridge-fd 0
94fd8ea5
WL
534
535auto vmbr0
536iface vmbr0 inet manual
7a39aabd
AL
537 bridge-ports bond0
538 bridge-stp off
539 bridge-fd 0
94fd8ea5
WL
540
541----
542
024d3706
SI
543Disabling IPv6 on the Node
544~~~~~~~~~~~~~~~~~~~~~~~~~~
545
546{pve} works correctly in all environments, irrespective of whether IPv6 is
547deployed or not. We recommend leaving all settings at the provided defaults.
548
549Should you still need to disable support for IPv6 on your node, do so by
550creating an appropriate `sysctl.conf (5)` snippet file and setting the proper
551https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt[sysctls],
552for example adding `/etc/sysctl.d/disable-ipv6.conf` with content:
553
554----
555net.ipv6.conf.all.disable_ipv6 = 1
556net.ipv6.conf.default.disable_ipv6 = 1
557----
558
559This method is preferred to disabling the loading of the IPv6 module on the
560https://www.kernel.org/doc/Documentation/networking/ipv6.rst[kernel commandline].
561
0bcd1f7f
DM
562////
563TODO: explain IPv6 support?
470d4313 564TODO: explain OVS
0bcd1f7f 565////