Advertisement
Guest User

pve01

a guest
Dec 30th, 2021
65
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.00 KB | None | 0 0
  1. root@pve01:~# pve-firewall compile
  2. ipset cmdlist:
  3. create PVEFW-0-management-v4 (IhYp62jU7XtKvLTE7SZci/oDVPk)
  4. create PVEFW-0-management-v4 hash:net family inet hashsize 64 maxelem 64 bucketsize 12
  5. add PVEFW-0-management-v4 192.168.10.0/24
  6. add PVEFW-0-management-v4 192.168.10.13
  7. add PVEFW-0-management-v4 192.168.10.14
  8. add PVEFW-0-management-v4 192.168.10.15
  9. add PVEFW-0-management-v4 192.168.10.8
  10. create PVEFW-0-management-v6 (6g+lzHFoCegXcweHRfBY4vRsbOc)
  11. create PVEFW-0-management-v6 hash:net family inet6 hashsize 64 maxelem 64 bucketsize 12
  12.  
  13. iptables cmdlist:
  14. create PVEFW-Drop (83WlR/a4wLbmURFqMQT3uJSgIG8)
  15. -A PVEFW-Drop -j PVEFW-DropBroadcast
  16. -A PVEFW-Drop -p icmp -m icmp --icmp-type fragmentation-needed -j ACCEPT
  17. -A PVEFW-Drop -p icmp -m icmp --icmp-type time-exceeded -j ACCEPT
  18. -A PVEFW-Drop -m conntrack --ctstate INVALID -j DROP
  19. -A PVEFW-Drop -p udp --match multiport --dports 135,445 -j DROP
  20. -A PVEFW-Drop -p udp --dport 137:139 -j DROP
  21. -A PVEFW-Drop -p udp --sport 137 --dport 1024:65535 -j DROP
  22. -A PVEFW-Drop -p tcp --match multiport --dports 135,139,445 -j DROP
  23. -A PVEFW-Drop -p udp --dport 1900 -j DROP
  24. -A PVEFW-Drop -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP
  25. -A PVEFW-Drop -p udp --sport 53 -j DROP
  26. create PVEFW-DropBroadcast (NyjHNAtFbkH7WGLamPpdVnxHy4w)
  27. -A PVEFW-DropBroadcast -m addrtype --dst-type BROADCAST -j DROP
  28. -A PVEFW-DropBroadcast -m addrtype --dst-type MULTICAST -j DROP
  29. -A PVEFW-DropBroadcast -m addrtype --dst-type ANYCAST -j DROP
  30. -A PVEFW-DropBroadcast -d 224.0.0.0/4 -j DROP
  31. create PVEFW-FORWARD (qnNexOcGa+y+jebd4dAUqFSp5nw)
  32. -A PVEFW-FORWARD -m conntrack --ctstate INVALID -j DROP
  33. -A PVEFW-FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  34. -A PVEFW-FORWARD -m physdev --physdev-is-bridged --physdev-in fwln+ -j PVEFW-FWBR-IN
  35. -A PVEFW-FORWARD -m physdev --physdev-is-bridged --physdev-out fwln+ -j PVEFW-FWBR-OUT
  36. create PVEFW-FWBR-IN (Ijl7/xz0DD7LF91MlLCz0ybZBE0)
  37. -A PVEFW-FWBR-IN -m conntrack --ctstate INVALID,NEW -j PVEFW-smurfs
  38. create PVEFW-FWBR-OUT (2jmj7l5rSw0yVb/vlWAYkK/YBwk)
  39. create PVEFW-HOST-IN (ng3GppdCTE8qPyYYn4W21MM+Cg0)
  40. -A PVEFW-HOST-IN -i lo -j ACCEPT
  41. -A PVEFW-HOST-IN -m conntrack --ctstate INVALID -j DROP
  42. -A PVEFW-HOST-IN -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  43. -A PVEFW-HOST-IN -m conntrack --ctstate INVALID,NEW -j PVEFW-smurfs
  44. -A PVEFW-HOST-IN -p igmp -j RETURN
  45. -A PVEFW-HOST-IN -i vmbr10 -s 192.168.10.0/24 -d 192.168.10.0/24 -p tcp --dport 3551 -j RETURN
  46. -A PVEFW-HOST-IN -s 192.168.70.0/24 -d 192.168.70.0/24 -p tcp --dport 6800:7300 -j RETURN
  47. -A PVEFW-HOST-IN -d 192.168.80.128/25 -p udp --dport 5405:5406 -j RETURN
  48. -A PVEFW-HOST-IN -d 192.168.80.0/25 -p udp --dport 5405:5406 -j RETURN
  49. -A PVEFW-HOST-IN -d 192.168.10.0/24 -p tcp --dport 6789 -j RETURN
  50. -A PVEFW-HOST-IN -d 192.168.10.0/24 -p tcp --dport 3300 -j RETURN
  51. -A PVEFW-HOST-IN -d 192.168.10.0/24 -p tcp --dport 6800:7300 -j RETURN
  52. -A PVEFW-HOST-IN -d 192.168.70.0/24 -p tcp --dport 8006 -j PVEFW-reject
  53. -A PVEFW-HOST-IN -d 192.168.80.128/25 -p tcp --dport 8006 -j PVEFW-reject
  54. -A PVEFW-HOST-IN -d 192.168.80.0/25 -p tcp --dport 8006 -j PVEFW-reject
  55. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v4 src -p tcp --dport 8006 -j RETURN
  56. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v4 src -p tcp --dport 5900:5999 -j RETURN
  57. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v4 src -p tcp --dport 3128 -j RETURN
  58. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v4 src -p tcp --dport 22 -j RETURN
  59. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v4 src -p tcp --dport 60000:60050 -j RETURN
  60. -A PVEFW-HOST-IN -d 192.168.80.101 -s 192.168.80.111 -p udp --dport 5404:5405 -j RETURN
  61. -A PVEFW-HOST-IN -d 192.168.80.201 -s 192.168.80.211 -p udp --dport 5404:5405 -j RETURN
  62. -A PVEFW-HOST-IN -d 192.168.80.101 -s 192.168.80.112 -p udp --dport 5404:5405 -j RETURN
  63. -A PVEFW-HOST-IN -d 192.168.80.201 -s 192.168.80.212 -p udp --dport 5404:5405 -j RETURN
  64. -A PVEFW-HOST-IN -d 192.168.80.101 -s 192.168.80.113 -p udp --dport 5404:5405 -j RETURN
  65. -A PVEFW-HOST-IN -d 192.168.80.201 -s 192.168.80.213 -p udp --dport 5404:5405 -j RETURN
  66. -A PVEFW-HOST-IN -d 192.168.80.101 -s 192.168.80.102 -p udp --dport 5404:5405 -j RETURN
  67. -A PVEFW-HOST-IN -d 192.168.80.201 -s 192.168.80.202 -p udp --dport 5404:5405 -j RETURN
  68. -A PVEFW-HOST-IN -d 192.168.80.101 -s 192.168.80.103 -p udp --dport 5404:5405 -j RETURN
  69. -A PVEFW-HOST-IN -d 192.168.80.201 -s 192.168.80.203 -p udp --dport 5404:5405 -j RETURN
  70. -A PVEFW-HOST-IN -j PVEFW-Drop
  71. -A PVEFW-HOST-IN -m limit --limit 1/sec -j NFLOG --nflog-prefix ":0:6:PVEFW-HOST-IN: policy DROP: "
  72. -A PVEFW-HOST-IN -j DROP
  73. create PVEFW-HOST-OUT (OzXkW+FRpC/Q9gHuEexitHeoYlI)
  74. -A PVEFW-HOST-OUT -o lo -j ACCEPT
  75. -A PVEFW-HOST-OUT -m conntrack --ctstate INVALID -j DROP
  76. -A PVEFW-HOST-OUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  77. -A PVEFW-HOST-OUT -p igmp -j RETURN
  78. -A PVEFW-HOST-OUT -d 192.168.10.0/24 -p tcp --dport 8006 -j RETURN
  79. -A PVEFW-HOST-OUT -d 192.168.10.0/24 -p tcp --dport 22 -j RETURN
  80. -A PVEFW-HOST-OUT -d 192.168.10.0/24 -p tcp --dport 5900:5999 -j RETURN
  81. -A PVEFW-HOST-OUT -d 192.168.10.0/24 -p tcp --dport 3128 -j RETURN
  82. -A PVEFW-HOST-OUT -s 192.168.80.101 -d 192.168.80.111 -p udp --dport 5404:5405 -j RETURN
  83. -A PVEFW-HOST-OUT -s 192.168.80.201 -d 192.168.80.211 -p udp --dport 5404:5405 -j RETURN
  84. -A PVEFW-HOST-OUT -s 192.168.80.101 -d 192.168.80.112 -p udp --dport 5404:5405 -j RETURN
  85. -A PVEFW-HOST-OUT -s 192.168.80.201 -d 192.168.80.212 -p udp --dport 5404:5405 -j RETURN
  86. -A PVEFW-HOST-OUT -s 192.168.80.101 -d 192.168.80.113 -p udp --dport 5404:5405 -j RETURN
  87. -A PVEFW-HOST-OUT -s 192.168.80.201 -d 192.168.80.213 -p udp --dport 5404:5405 -j RETURN
  88. -A PVEFW-HOST-OUT -s 192.168.80.101 -d 192.168.80.102 -p udp --dport 5404:5405 -j RETURN
  89. -A PVEFW-HOST-OUT -s 192.168.80.201 -d 192.168.80.202 -p udp --dport 5404:5405 -j RETURN
  90. -A PVEFW-HOST-OUT -s 192.168.80.101 -d 192.168.80.103 -p udp --dport 5404:5405 -j RETURN
  91. -A PVEFW-HOST-OUT -s 192.168.80.201 -d 192.168.80.203 -p udp --dport 5404:5405 -j RETURN
  92. -A PVEFW-HOST-OUT -j RETURN
  93. create PVEFW-INPUT (+5iMmLaxKXynOB/+5xibfx7WhFk)
  94. -A PVEFW-INPUT -j PVEFW-HOST-IN
  95. create PVEFW-OUTPUT (LjHoZeSSiWAG3+2ZAyL/xuEehd0)
  96. -A PVEFW-OUTPUT -j PVEFW-HOST-OUT
  97. create PVEFW-Reject (h3DyALVslgH5hutETfixGP08w7c)
  98. -A PVEFW-Reject -j PVEFW-DropBroadcast
  99. -A PVEFW-Reject -p icmp -m icmp --icmp-type fragmentation-needed -j ACCEPT
  100. -A PVEFW-Reject -p icmp -m icmp --icmp-type time-exceeded -j ACCEPT
  101. -A PVEFW-Reject -m conntrack --ctstate INVALID -j DROP
  102. -A PVEFW-Reject -p udp --match multiport --dports 135,445 -j PVEFW-reject
  103. -A PVEFW-Reject -p udp --dport 137:139 -j PVEFW-reject
  104. -A PVEFW-Reject -p udp --sport 137 --dport 1024:65535 -j PVEFW-reject
  105. -A PVEFW-Reject -p tcp --match multiport --dports 135,139,445 -j PVEFW-reject
  106. -A PVEFW-Reject -p udp --dport 1900 -j DROP
  107. -A PVEFW-Reject -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP
  108. -A PVEFW-Reject -p udp --sport 53 -j DROP
  109. create PVEFW-SET-ACCEPT-MARK (Hg/OIgIwJChBUcWU8Xnjhdd2jUY)
  110. -A PVEFW-SET-ACCEPT-MARK -j MARK --set-mark 0x80000000/0x80000000
  111. create PVEFW-logflags (MN4PH1oPZeABMuWr64RrygPfW7A)
  112. -A PVEFW-logflags -j DROP
  113. create PVEFW-reject (Jlkrtle1mDdtxDeI9QaDSL++Npc)
  114. -A PVEFW-reject -m addrtype --dst-type BROADCAST -j DROP
  115. -A PVEFW-reject -s 224.0.0.0/4 -j DROP
  116. -A PVEFW-reject -p icmp -j DROP
  117. -A PVEFW-reject -p tcp -j REJECT --reject-with tcp-reset
  118. -A PVEFW-reject -p udp -j REJECT --reject-with icmp-port-unreachable
  119. -A PVEFW-reject -p icmp -j REJECT --reject-with icmp-host-unreachable
  120. -A PVEFW-reject -j REJECT --reject-with icmp-host-prohibited
  121. create PVEFW-smurflog (2gfT1VMkfr0JL6OccRXTGXo+1qk)
  122. -A PVEFW-smurflog -j DROP
  123. create PVEFW-smurfs (HssVe5QCBXd5mc9kC88749+7fag)
  124. -A PVEFW-smurfs -s 0.0.0.0/32 -j RETURN
  125. -A PVEFW-smurfs -m addrtype --src-type BROADCAST -g PVEFW-smurflog
  126. -A PVEFW-smurfs -s 224.0.0.0/4 -g PVEFW-smurflog
  127. create PVEFW-tcpflags (CMFojwNPqllyqD67NeI5m+bP5mo)
  128. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -g PVEFW-logflags
  129. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -g PVEFW-logflags
  130. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -g PVEFW-logflags
  131. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -g PVEFW-logflags
  132. -A PVEFW-tcpflags -p tcp -m tcp --sport 0 --tcp-flags FIN,SYN,RST,ACK SYN -g PVEFW-logflags
  133.  
  134. ip6tables cmdlist:
  135. create PVEFW-Drop (Jb79Uw7z1vZglIcV7QXA5uY/nbk)
  136. -A PVEFW-Drop -p tcp --dport 43 -j PVEFW-reject
  137. -A PVEFW-Drop -j PVEFW-DropBroadcast
  138. -A PVEFW-Drop -p icmpv6 -m icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
  139. -A PVEFW-Drop -p icmpv6 -m icmpv6 --icmpv6-type time-exceeded -j ACCEPT
  140. -A PVEFW-Drop -p icmpv6 -m icmpv6 --icmpv6-type packet-too-big -j ACCEPT
  141. -A PVEFW-Drop -m conntrack --ctstate INVALID -j DROP
  142. -A PVEFW-Drop -p udp --match multiport --dports 135,445 -j DROP
  143. -A PVEFW-Drop -p udp --dport 137:139 -j DROP
  144. -A PVEFW-Drop -p udp --sport 137 --dport 1024:65535 -j DROP
  145. -A PVEFW-Drop -p tcp --match multiport --dports 135,139,445 -j DROP
  146. -A PVEFW-Drop -p udp --dport 1900 -j DROP
  147. -A PVEFW-Drop -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP
  148. -A PVEFW-Drop -p udp --sport 53 -j DROP
  149. create PVEFW-DropBroadcast (8Krk5Nh8pDZOOc7BQAbM6PlyFSU)
  150. -A PVEFW-DropBroadcast -d ff00::/8 -j DROP
  151. create PVEFW-FORWARD (qnNexOcGa+y+jebd4dAUqFSp5nw)
  152. -A PVEFW-FORWARD -m conntrack --ctstate INVALID -j DROP
  153. -A PVEFW-FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  154. -A PVEFW-FORWARD -m physdev --physdev-is-bridged --physdev-in fwln+ -j PVEFW-FWBR-IN
  155. -A PVEFW-FORWARD -m physdev --physdev-is-bridged --physdev-out fwln+ -j PVEFW-FWBR-OUT
  156. create PVEFW-FWBR-IN (2jmj7l5rSw0yVb/vlWAYkK/YBwk)
  157. create PVEFW-FWBR-OUT (2jmj7l5rSw0yVb/vlWAYkK/YBwk)
  158. create PVEFW-HOST-IN (G5RxcxJzHl8SHdIJWqqdR+ZyBgA)
  159. -A PVEFW-HOST-IN -i lo -j ACCEPT
  160. -A PVEFW-HOST-IN -m conntrack --ctstate INVALID -j DROP
  161. -A PVEFW-HOST-IN -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  162. -A PVEFW-HOST-IN -p icmpv6 --icmpv6-type router-solicitation -j RETURN
  163. -A PVEFW-HOST-IN -p icmpv6 --icmpv6-type router-advertisement -j RETURN
  164. -A PVEFW-HOST-IN -p icmpv6 --icmpv6-type neighbor-solicitation -j RETURN
  165. -A PVEFW-HOST-IN -p icmpv6 --icmpv6-type neighbor-advertisement -j RETURN
  166. -A PVEFW-HOST-IN -p igmp -j RETURN
  167. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v6 src -p tcp --dport 8006 -j RETURN
  168. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v6 src -p tcp --dport 5900:5999 -j RETURN
  169. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v6 src -p tcp --dport 3128 -j RETURN
  170. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v6 src -p tcp --dport 22 -j RETURN
  171. -A PVEFW-HOST-IN -m set --match-set PVEFW-0-management-v6 src -p tcp --dport 60000:60050 -j RETURN
  172. -A PVEFW-HOST-IN -j PVEFW-Drop
  173. -A PVEFW-HOST-IN -m limit --limit 1/sec -j NFLOG --nflog-prefix ":0:6:PVEFW-HOST-IN: policy DROP: "
  174. -A PVEFW-HOST-IN -j DROP
  175. create PVEFW-HOST-OUT (br2bPbA9ZjuHOMNhV8tfLRw1mAs)
  176. -A PVEFW-HOST-OUT -o lo -j ACCEPT
  177. -A PVEFW-HOST-OUT -m conntrack --ctstate INVALID -j DROP
  178. -A PVEFW-HOST-OUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  179. -A PVEFW-HOST-OUT -p icmpv6 --icmpv6-type router-solicitation -j RETURN
  180. -A PVEFW-HOST-OUT -p icmpv6 --icmpv6-type neighbor-solicitation -j RETURN
  181. -A PVEFW-HOST-OUT -p icmpv6 --icmpv6-type neighbor-advertisement -j RETURN
  182. -A PVEFW-HOST-OUT -p igmp -j RETURN
  183. -A PVEFW-HOST-OUT -j RETURN
  184. create PVEFW-INPUT (+5iMmLaxKXynOB/+5xibfx7WhFk)
  185. -A PVEFW-INPUT -j PVEFW-HOST-IN
  186. create PVEFW-OUTPUT (LjHoZeSSiWAG3+2ZAyL/xuEehd0)
  187. -A PVEFW-OUTPUT -j PVEFW-HOST-OUT
  188. create PVEFW-Reject (aL1nrxJk/u3XmTb3Am2eaM/3yCM)
  189. -A PVEFW-Reject -p tcp --dport 43 -j PVEFW-reject
  190. -A PVEFW-Reject -j PVEFW-DropBroadcast
  191. -A PVEFW-Reject -p icmpv6 -m icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
  192. -A PVEFW-Reject -p icmpv6 -m icmpv6 --icmpv6-type time-exceeded -j ACCEPT
  193. -A PVEFW-Reject -p icmpv6 -m icmpv6 --icmpv6-type packet-too-big -j ACCEPT
  194. -A PVEFW-Reject -m conntrack --ctstate INVALID -j DROP
  195. -A PVEFW-Reject -p udp --match multiport --dports 135,445 -j PVEFW-reject
  196. -A PVEFW-Reject -p udp --dport 137:139 -j PVEFW-reject
  197. -A PVEFW-Reject -p udp --sport 137 --dport 1024:65535 -j PVEFW-reject
  198. -A PVEFW-Reject -p tcp --match multiport --dports 135,139,445 -j PVEFW-reject
  199. -A PVEFW-Reject -p udp --dport 1900 -j DROP
  200. -A PVEFW-Reject -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP
  201. -A PVEFW-Reject -p udp --sport 53 -j DROP
  202. create PVEFW-SET-ACCEPT-MARK (Hg/OIgIwJChBUcWU8Xnjhdd2jUY)
  203. -A PVEFW-SET-ACCEPT-MARK -j MARK --set-mark 0x80000000/0x80000000
  204. create PVEFW-logflags (MN4PH1oPZeABMuWr64RrygPfW7A)
  205. -A PVEFW-logflags -j DROP
  206. create PVEFW-reject (etEECUYcgUdzuuO+LDP83pu0S8Y)
  207. -A PVEFW-reject -p icmpv6 -j DROP
  208. -A PVEFW-reject -p tcp -j REJECT --reject-with tcp-reset
  209. -A PVEFW-reject -p udp -j REJECT --reject-with icmp6-port-unreachable
  210. -A PVEFW-reject -j REJECT --reject-with icmp6-adm-prohibited
  211. create PVEFW-tcpflags (CMFojwNPqllyqD67NeI5m+bP5mo)
  212. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -g PVEFW-logflags
  213. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -g PVEFW-logflags
  214. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -g PVEFW-logflags
  215. -A PVEFW-tcpflags -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -g PVEFW-logflags
  216. -A PVEFW-tcpflags -p tcp -m tcp --sport 0 --tcp-flags FIN,SYN,RST,ACK SYN -g PVEFW-logflags
  217.  
  218. ebtables cmdlist:
  219. create PVEFW-FORWARD (ULtZ6lqjrD/jAKLY+OZo3BbXs9k)
  220. -A PVEFW-FORWARD -p IPv4 -j ACCEPT
  221. -A PVEFW-FORWARD -p IPv6 -j ACCEPT
  222. -A PVEFW-FORWARD -o fwln+ -j PVEFW-FWBR-OUT
  223. create PVEFW-FWBR-OUT (2jmj7l5rSw0yVb/vlWAYkK/YBwk)
  224. ignore FORWARD (2jmj7l5rSw0yVb/vlWAYkK/YBwk)
  225. ignore INPUT (2jmj7l5rSw0yVb/vlWAYkK/YBwk)
  226. ignore OUTPUT (2jmj7l5rSw0yVb/vlWAYkK/YBwk)
  227.  
  228. iptables table raw cmdlist:
  229.  
  230. ip6tables table raw cmdlist:
  231. detected changes
  232. root@pve01:~#
  233. root@pve01:~#
  234. root@pve01:~# iptables-save
  235. # Generated by iptables-save v1.8.7 on Thu Dec 30 06:40:01 2021
  236. *raw
  237. :PREROUTING ACCEPT [277743187:890399602266]
  238. :OUTPUT ACCEPT [256870320:2937334564111]
  239. COMMIT
  240. # Completed on Thu Dec 30 06:40:01 2021
  241. # Generated by iptables-save v1.8.7 on Thu Dec 30 06:40:01 2021
  242. *filter
  243. :INPUT ACCEPT [199699699:696413386993]
  244. :FORWARD ACCEPT [25311923:82313462272]
  245. :OUTPUT ACCEPT [200515979:1920220680332]
  246. COMMIT
  247. # Completed on Thu Dec 30 06:40:01 2021
  248. root@pve01:~#
  249. root@pve01:~#
  250. root@pve01:~# pve-firewall localnet
  251. local hostname: pve01
  252. local IP address: 192.168.10.3
  253. network auto detect: 192.168.10.0/24
  254. using detected local_network: 192.168.10.0/24
  255.  
  256. accepting corosync traffic from/to:
  257. - mon01: 192.168.80.111 (link: 0)
  258. - mon01: 192.168.80.211 (link: 1)
  259. - mon02: 192.168.80.112 (link: 0)
  260. - mon02: 192.168.80.212 (link: 1)
  261. - mon03: 192.168.80.113 (link: 0)
  262. - mon03: 192.168.80.213 (link: 1)
  263. - pve02: 192.168.80.102 (link: 0)
  264. - pve02: 192.168.80.202 (link: 1)
  265. - pve03: 192.168.80.103 (link: 0)
  266. - pve03: 192.168.80.203 (link: 1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement