I've got somewhat of a work around, as it needs to be applied manually each
time the firewall is reset.

Example here is the devices I want to have this enabled on, and then the first
command replaces the first rule and then the next insert the following rules
at 2 in the chain.

iptables -R PVEFW-FORWARD 1 -m conntrack --ctstate INVALID --in-interface vmbr8 
-j DROP
iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID --in-interface 
vmbr44 -j DROP
iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID --in-interface 
vmbr45 -j DROP
iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID --in-interface 
vmbr192 -j DROP
iptables -I PVEFW-FORWARD 2 -m conntrack --ctstate INVALID --in-interface 
vmbr199 -j DROP

As there's no way to exclude multiple interfaces on the iptables command, the
only way to do this is white list interfaces.  This should really be how
proxmox does it, asking about connection tracking at the per bridge
level.  I do want it on some of the bridges, but on others, it needs to be
optional.

I'm frankly surprised that there's no one else who's run into this as it
appears many issues are caused by this.
--
Bryan Fields

727-409-1194 - Voice
http://bryanfields.net

_______________________________________________
pve-user mailing list
pve-user@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-user

Reply via email to