X-Git-Url: https://git.proxmox.com/?p=pve-docs.git;a=blobdiff_plain;f=pve-firewall.adoc;h=acaca95934ce161caebc97757863d95441d6c62d;hp=6019f95c0295d940ba59fbdc604b8203d63ebabf;hb=3fecf41f88fb6115d0af6495822e5d3ed940ed93;hpb=7e2fdb3dfdd79fb37449fd4e69f8e4c605e67361 diff --git a/pve-firewall.adoc b/pve-firewall.adoc index 6019f95..acaca95 100644 --- a/pve-firewall.adoc +++ b/pve-firewall.adoc @@ -1,8 +1,7 @@ +[[chapter_pve_firewall]] ifdef::manvolnum[] -PVE(8) -====== -include::attributes.txt[] - +pve-firewall(8) +=============== :pve-toplevel: NAME @@ -20,15 +19,12 @@ include::pve-firewall.8-synopsis.adoc[] DESCRIPTION ----------- endif::manvolnum[] - ifndef::manvolnum[] {pve} Firewall ============== -include::attributes.txt[] +:pve-toplevel: endif::manvolnum[] - ifdef::wiki[] -:pve-toplevel: :title: Firewall endif::wiki[] @@ -84,6 +80,7 @@ comments. Sections starts with a header line containing the section name enclosed in `[` and `]`. +[[pve_firewall_cluster_wide_setup]] Cluster Wide Setup ~~~~~~~~~~~~~~~~~~ @@ -146,6 +143,7 @@ To simplify that task, you can instead create an IPSet called firewall rules to access the GUI from remote. +[[pve_firewall_host_specific_configuration]] Host Specific Configuration ~~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -167,7 +165,7 @@ include::pve-firewall-host-opts.adoc[] This sections contains host specific firewall rules. - +[[pve_firewall_vm_container_configuration]] VM/Container Configuration ~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -203,10 +201,6 @@ Each virtual network device has its own firewall enable flag. So you can selectively enable the firewall for each interface. This is required in addition to the general firewall `enable` option. -The firewall requires a special network device setup, so you need to -restart the VM/container after enabling the firewall on a network -interface. - Firewall Rules -------------- @@ -237,8 +231,8 @@ Here are some examples: IN SSH(ACCEPT) -i net0 IN SSH(ACCEPT) -i net0 # a comment IN SSH(ACCEPT) -i net0 -source 192.168.2.192 # only allow SSH from 192.168.2.192 -IN SSH(ACCEPT) -i net0 -source 10.0.0.1-10.0.0.10 # accept SSH for ip range -IN SSH(ACCEPT) -i net0 -source 10.0.0.1,10.0.0.2,10.0.0.3 #accept ssh for ip list +IN SSH(ACCEPT) -i net0 -source 10.0.0.1-10.0.0.10 # accept SSH for IP range +IN SSH(ACCEPT) -i net0 -source 10.0.0.1,10.0.0.2,10.0.0.3 #accept ssh for IP list IN SSH(ACCEPT) -i net0 -source +mynetgroup # accept ssh for ipset mynetgroup IN SSH(ACCEPT) -i net0 -source myserveralias #accept ssh for alias myserveralias @@ -249,6 +243,7 @@ OUT ACCEPT # accept all outgoing packages ---- +[[pve_firewall_security_groups]] Security Groups --------------- @@ -273,7 +268,7 @@ Then, you can add this group to a VM's firewall GROUP webserver ---- - +[[pve_firewall_ip_aliases]] IP Aliases ---------- @@ -308,10 +303,10 @@ explicitly assign the local IP address ---- # /etc/pve/firewall/cluster.fw [ALIASES] -local_network 1.2.3.4 # use the single ip address +local_network 1.2.3.4 # use the single IP address ---- - +[[pve_firewall_ip_sets]] IP Sets ------- @@ -359,7 +354,7 @@ Traffic from these IPs is dropped by every host's and VM's firewall. ---- -[[ipfilter-section]] +[[pve_firewall_ipfilter_section]] Standard IP set `ipfilter-net*` ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -476,7 +471,7 @@ address are used. By default the `NDP` option is enabled on both host and VM level to allow neighbor discovery (NDP) packets to be sent and received. Beside neighbor discovery NDP is also used for a couple of other things, like -autoconfiguration and advertising routers. +auto-configuration and advertising routers. By default VMs are allowed to send out router solicitation messages (to query for a router), and to receive router advertisement packets. This allows them to @@ -488,7 +483,7 @@ As for the link local addresses required for NDP, there's also an ``IP Filter'' (`ipfilter: 1`) option which can be enabled which has the same effect as adding an `ipfilter-net*` ipset for each of the VM's network interfaces containing the corresponding link local addresses. (See the -<> section for details.) +<> section for details.) Ports used by {pve}