DEV Community

Cover image for Proxmox Network Storage: Firewall Rules
Richard Chamberlain
Richard Chamberlain

Posted on

Proxmox Network Storage: Firewall Rules

Proxmox Network Storage

So far, we've utilized a Direct Attached Storage (DAC) and a Single Board Computer (SBC) to set up a NAS (Network Attached Storage) using Samba. The next step was securing the NAS by placing it on a dedicated VLAN subnet, isolating it from other devices in my home lab. This setup effectively reduces the attack surface and limits exposure to only the systems that need access. Now, we’ll focus on configuring firewall rules to ensure secure communication between the authorized devices and the NAS.

Firewall Aliases

When setting up firewall rules, you're assigning permissions for devices to access other devices. This can be done by specifying attributes such as MAC addresses, IP addresses, ports, and Fully Qualified Domain Names (FQDNs). However, managing these values, especially MAC addresses or IPs, can become cumbersome and difficult to remember after creating the rules.

For example, the dock for my MacBook Air has the MAC address 3A:2C:4F:5E:8B:1A. Instead of trying to remember that, I can create an alias called macbookair_dock on the firewall. Now, whenever I use macbookair_dock in my firewall configuration, the system will recognize it as the corresponding MAC address 3A:2C:4F:5E:8B:1A, making it easier to manage.

For this project, I’ve created the following aliases:

Alias Type Value
macbookair_dock MAC address 3A:2C:4F:5E:8B:1A
iPad MAC address F2:77:3C:6D:1E:82
iPhone MAC address 09:AF:BA:63:92:4E
ProxmoxVE Host(s) 192.168.177.7,192.168.177.8
ProxmoxBS Host(s) 192.168.177.129
SambaPorts Port(s) 137,138,139,445
SambaPve Host(s) 192.168.197.7
SambaMedia Host(s) 192.168.198.8

With these aliases in place, the firewall rules we create in the next section will be much clearer and easier to manage.

Note: MAC vs Hosts

The servers on my network have static IP addresses, so using IP address would work well for them. However, many other devices do not have static IPs, making their IP addresses less reliable for identification. In these cases, using the MAC address (Media Access Control address) provides a more consistent and stable way to reference those devices.

Proxmox Servers to NAS

The Proxmox servers will be utilizing the NAS for two main purposes:

  • ISO storage
  • Backups

To enable this, the following firewall rules were necessary:

# Interface Source Destination Ports
1 VLANforProxmox ProxmoxVE SambaPve SambaPorts
2 VLANforProxmox ProxmoxBS SambaPve SambaPorts

Rule 1:

This rule permits the Proxmox servers to store ISO images on the NAS and ensures that virtual machines (VMs) can access the necessary storage resources for proper operation.

Rule 2:

This rule enables the Proxmox Backup Server to securely store backups on the NAS, ensuring that data is protected and recoverable as needed.

Virtual Servers to NAS

The virtual servers will use the NAS for shared storage. To facilitate this, the following firewall rules are required:

# Interface Source Destination Ports
1 VLANforProxmoxVM ProxmoxVE SambaPve SambaPorts

WiFi to Media

This setup allows my iPhone and iPad to access documents and media stored on the NAS. The following firewall rules were implemented to ensure secure access:

Since access was not granted to the entire WiFi subnet, any additional users connecting to the WiFi network will not have access to the files on the shared NAS. This ensures a higher level of security by restricting access to only authorized devices.

At this point, the Samba service has been installed, the VLANs are configured, and the firewall rules are in place. In the next article, I will cover mounting external hard drives and configuring Samba to further restrict access to the shared resources.

Top comments (0)