[PVE-User] PVE-firewall and multicast with linux bridging
g.husson_proxmox-pve-user at liberasys.com
g.husson_proxmox-pve-user at liberasys.com
Mon Jun 30 08:16:48 CEST 2025
Hello Bryan,
"It is not a bug, it is a feature" :-)
Look at the documentation :
===
The following traffic is dropped, but not logged even with logging enabled:
- Broadcast, multicast and anycast traffic not related to corosync,
i.e., not coming through ports 5405-5412
===
Again, from the documentation :
===
proxmox-firewall will create two tables that are managed by the
proxmox-firewall service: proxmox-firewall and proxmox-firewall-guests.
If you want to create custom rules that live outside the Proxmox VE
firewall configuration you can create your own tables to manage your
custom firewall rules. proxmox-firewall will only touch the tables it
generates, so you can easily extend and modify the behavior of the
proxmox-firewall by adding your own tables.
===
Now you can use rc.local, or crontab @reboot or better a systemd file
that chains after proxmox VE firewall start in order to apply the manual
rules you found.
Best regards,
Gautier Husson.
On 29/06/2025 10:14, Bryan Fields wrote:
> I've got somewhat of a work around, as it needs to be applied manually
> each
> time the firewall is reset.
>
> Example here is the devices I want to have this enabled on, and then
> the first
> command replaces the first rule and then the next insert the following
> rules
> at 2 in the chain.
>
> iptables -R PVEFW-FORWARD 1 -m conntrack --ctstate INVALID
> --in-interface vmbr8 -j DROP
> iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID
> --in-interface vmbr44 -j DROP
> iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID
> --in-interface vmbr45 -j DROP
> iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID
> --in-interface vmbr192 -j DROP
> iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID
> --in-interface vmbr199 -j DROP
>
> As there's no way to exclude multiple interfaces on the iptables
> command, the
> only way to do this is white list interfaces. This should really be how
> proxmox does it, asking about connection tracking at the per bridge
> level. I do want it on some of the bridges, but on others, it needs
> to be
> optional.
>
> I'm frankly surprised that there's no one else who's run into this as it
> appears many issues are caused by this.
More information about the pve-user
mailing list