From: Manuel Federanko <m.federanko@proxmox.com>
To: pve-devel@lists.proxmox.com
Subject: [PATCH docs v2] pve-firewall: link to implicit rules section.
Date: Tue, 5 May 2026 13:20:49 +0200 [thread overview]
Message-ID: <20260505112049.52552-1-m.federanko@proxmox.com> (raw)
Updated the documentation note to link to the default rules.
Also added a section directing users to the macro system if they need
additional rules.
Add a note to the Ceph section that the firewall has to be configured,
if it is enabled.
Suggested-by: Friedrich Weber <f.weber@proxmox.com>
Signed-off-by: Manuel Federanko <m.federanko@proxmox.com>
---
pve-firewall.adoc | 14 +++++++++++---
pveceph.adoc | 3 +++
2 files changed, 14 insertions(+), 3 deletions(-)
diff --git a/pve-firewall.adoc b/pve-firewall.adoc
index f04134a..21608c9 100644
--- a/pve-firewall.adoc
+++ b/pve-firewall.adoc
@@ -172,9 +172,15 @@ set the enable option here:
enable: 1
----
-IMPORTANT: If you enable the firewall, traffic to all hosts is blocked by
-default. Only exceptions is WebGUI(8006) and ssh(22) from your local
-network.
+IMPORTANT: If you enable the firewall, traffic to all hosts will be
+blocked by default - with some exceptions for traffic coming from the
+local network to the WebUI, SSH and other important services. A full
+list of the default firewall rules can be found at
+xref:pve_firewall_default_rules.
+
+Should you have other services running which communicate over the
+network, you will have to allow them seperately. For some common
+services there are `macros` available.
If you want to administrate your {pve} hosts from remote, you
need to create rules to allow traffic from those remote IPs to the web
@@ -510,6 +516,8 @@ following traffic is still allowed for all {pve} hosts in the cluster:
* TCP traffic from management hosts to port 3128 for connections to the SPICE
proxy
* TCP traffic from management hosts to port 22 to allow ssh access
+* TCP traffic from management hots to the port range 60000 to 60050 allowing
+ traffic for migrations
* UDP traffic in the cluster network to ports 5405-5412 for corosync
* UDP multicast traffic in the cluster network
* ICMP traffic type 3 (Destination Unreachable), 4 (congestion control) or 11
diff --git a/pveceph.adoc b/pveceph.adoc
index fc8a072..05b21bb 100644
--- a/pveceph.adoc
+++ b/pveceph.adoc
@@ -180,6 +180,9 @@ high-performance setups:
* one medium bandwidth (1 Gbps) exclusive for the latency sensitive corosync
cluster communication.
+If a firewall is enabled you will have to open the ports used by Ceph, the
+easiest way to do this is to use a firewall `macro`.
+
[[pve_ceph_recommendation_disk]]
.Disks
When planning the size of your Ceph cluster, it is important to take the
--
2.47.3
reply other threads:[~2026-05-05 11:21 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260505112049.52552-1-m.federanko@proxmox.com \
--to=m.federanko@proxmox.com \
--cc=pve-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.