* [PATCH docs] pve-firewall: update list of implicit rules.
@ 2026-05-04 11:04 Manuel Federanko
2026-05-04 11:10 ` Stefan Hanreich
2026-05-05 11:22 ` superseded: " Manuel Federanko
0 siblings, 2 replies; 4+ messages in thread
From: Manuel Federanko @ 2026-05-04 11:04 UTC (permalink / raw)
To: pve-devel
Updated the documentation note to reflect the current state of
pve-firewall. Also added a section directing users to the macro system
if they need additional rules.
Suggested-by: Friedrich Weber <f.weber@proxmox.com>
Signed-off-by: Manuel Federanko <m.federanko@proxmox.com>
---
pve-firewall.adoc | 11 ++++++++---
1 file changed, 8 insertions(+), 3 deletions(-)
diff --git a/pve-firewall.adoc b/pve-firewall.adoc
index f04134a..df396d1 100644
--- a/pve-firewall.adoc
+++ b/pve-firewall.adoc
@@ -172,9 +172,14 @@ set the enable option here:
enable: 1
----
-IMPORTANT: If you enable the firewall, traffic to all hosts is blocked by
-default. Only exceptions is WebGUI(8006) and ssh(22) from your local
-network.
+IMPORTANT: If you enable the firewall, traffic to all hosts is blocked
+by default. The only exceptions are the WebGUI(8006), ssh(22), corosync
+(5404:5405), VNC(5900:5999), SPICE(3128) and the migration ports
+(60000:60050) from your local network.
+
+Should you have other services running which communicate over the
+network, you will have to allow them seperately. For some common
+services there are `macros` available.
If you want to administrate your {pve} hosts from remote, you
need to create rules to allow traffic from those remote IPs to the web
--
2.47.3
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH docs] pve-firewall: update list of implicit rules.
2026-05-04 11:04 [PATCH docs] pve-firewall: update list of implicit rules Manuel Federanko
@ 2026-05-04 11:10 ` Stefan Hanreich
2026-05-05 11:21 ` Manuel Federanko
2026-05-05 11:22 ` superseded: " Manuel Federanko
1 sibling, 1 reply; 4+ messages in thread
From: Stefan Hanreich @ 2026-05-04 11:10 UTC (permalink / raw)
To: pve-devel
There is also a completely separate section which describes the default
firewall ruleset in greater detail [1]. It might make sense to link to
this section and maintain the full list there? This warning could then
be reformulated a bit (just a draft):
If you enable the firewall, traffic to all hosts will be blocked by
default - with some exceptions for traffic coming from the local network
to the WebUI, SSH and other important services. More information can be
found <link_to_default_rules_section>.
[1]
https://pve.proxmox.com/pve-docs/pve-admin-guide.html#_datacenter_incoming_outgoing_drop_reject
On 5/4/26 1:03 PM, Manuel Federanko wrote:
> Updated the documentation note to reflect the current state of
> pve-firewall. Also added a section directing users to the macro system
> if they need additional rules.
>
> Suggested-by: Friedrich Weber <f.weber@proxmox.com>
> Signed-off-by: Manuel Federanko <m.federanko@proxmox.com>
> ---
> pve-firewall.adoc | 11 ++++++++---
> 1 file changed, 8 insertions(+), 3 deletions(-)
>
> diff --git a/pve-firewall.adoc b/pve-firewall.adoc
> index f04134a..df396d1 100644
> --- a/pve-firewall.adoc
> +++ b/pve-firewall.adoc
> @@ -172,9 +172,14 @@ set the enable option here:
> enable: 1
> ----
>
> -IMPORTANT: If you enable the firewall, traffic to all hosts is blocked by
> -default. Only exceptions is WebGUI(8006) and ssh(22) from your local
> -network.
> +IMPORTANT: If you enable the firewall, traffic to all hosts is blocked
> +by default. The only exceptions are the WebGUI(8006), ssh(22), corosync
> +(5404:5405), VNC(5900:5999), SPICE(3128) and the migration ports
> +(60000:60050) from your local network.
> +
> +Should you have other services running which communicate over the
> +network, you will have to allow them seperately. For some common
> +services there are `macros` available.
>
> If you want to administrate your {pve} hosts from remote, you
> need to create rules to allow traffic from those remote IPs to the web
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH docs] pve-firewall: update list of implicit rules.
2026-05-04 11:10 ` Stefan Hanreich
@ 2026-05-05 11:21 ` Manuel Federanko
0 siblings, 0 replies; 4+ messages in thread
From: Manuel Federanko @ 2026-05-05 11:21 UTC (permalink / raw)
To: pve-devel
On 2026-05-04 1:09 PM, Stefan Hanreich wrote:
> There is also a completely separate section which describes the default
> firewall ruleset in greater detail [1]. It might make sense to link to
> this section and maintain the full list there? This warning could then
> be reformulated a bit (just a draft):
>
> If you enable the firewall, traffic to all hosts will be blocked by
> default - with some exceptions for traffic coming from the local network
> to the WebUI, SSH and other important services. More information can be
> found <link_to_default_rules_section>.
>
>
> [1]
> https://pve.proxmox.com/pve-docs/pve-admin-guide.html#_datacenter_incoming_outgoing_drop_reject
Thanks for the feedback! I just sent a v2
> On 5/4/26 1:03 PM, Manuel Federanko wrote:
>> Updated the documentation note to reflect the current state of
>> pve-firewall. Also added a section directing users to the macro system
>> if they need additional rules.
>>
>> Suggested-by: Friedrich Weber <f.weber@proxmox.com>
>> Signed-off-by: Manuel Federanko <m.federanko@proxmox.com>
>> ---
>> pve-firewall.adoc | 11 ++++++++---
>> 1 file changed, 8 insertions(+), 3 deletions(-)
>>
>> diff --git a/pve-firewall.adoc b/pve-firewall.adoc
>> index f04134a..df396d1 100644
>> --- a/pve-firewall.adoc
>> +++ b/pve-firewall.adoc
>> @@ -172,9 +172,14 @@ set the enable option here:
>> enable: 1
>> ----
>>
>> -IMPORTANT: If you enable the firewall, traffic to all hosts is blocked by
>> -default. Only exceptions is WebGUI(8006) and ssh(22) from your local
>> -network.
>> +IMPORTANT: If you enable the firewall, traffic to all hosts is blocked
>> +by default. The only exceptions are the WebGUI(8006), ssh(22), corosync
>> +(5404:5405), VNC(5900:5999), SPICE(3128) and the migration ports
>> +(60000:60050) from your local network.
>> +
>> +Should you have other services running which communicate over the
>> +network, you will have to allow them seperately. For some common
>> +services there are `macros` available.
>>
>> If you want to administrate your {pve} hosts from remote, you
>> need to create rules to allow traffic from those remote IPs to the web
>
^ permalink raw reply [flat|nested] 4+ messages in thread
* superseded: [PATCH docs] pve-firewall: update list of implicit rules.
2026-05-04 11:04 [PATCH docs] pve-firewall: update list of implicit rules Manuel Federanko
2026-05-04 11:10 ` Stefan Hanreich
@ 2026-05-05 11:22 ` Manuel Federanko
1 sibling, 0 replies; 4+ messages in thread
From: Manuel Federanko @ 2026-05-05 11:22 UTC (permalink / raw)
To: pve-devel
Superseded-by: https://lore.proxmox.com/pve-devel/20260505112049.52552-1-m.federanko@proxmox.com/T/#u
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2026-05-05 11:22 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-04 11:04 [PATCH docs] pve-firewall: update list of implicit rules Manuel Federanko
2026-05-04 11:10 ` Stefan Hanreich
2026-05-05 11:21 ` Manuel Federanko
2026-05-05 11:22 ` superseded: " Manuel Federanko
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox