Proxmox Firewall Service Disable using Command Rumi, March 20, 2024 Chrooting and then doing: systemctl disable pve-firewall systemctl mask pve-firewall should do the trick. then after rebooting and fixing your config, systemctl unmask pve-firewall systemctl enable pve-firewall systemctl start pve-firewall Should return to the defaults again. Ports used by Proxmox VE Web interface: 8006 (TCP, HTTP/1.1 over TLS) VNC Web console: 5900-5999 (TCP, WebSocket SPICE proxy: 3128 (TCP) sshd (used for cluster actions): 22 (TCP) rpcbind: 111 (UDP) sendmail: 25 (TCP, outgoing) corosync cluster traffic: 5405-5412 UDP live migration (VM memory and local-disk data): 60000-60050 (TCP) Ref: https://pve.proxmox.com/wiki/Firewall https://forum.proxmox.com/threads/how-to-disable-pve-firewall-after-lock-out-datacenter-level-firewall.60557/ Related Administrations Configurations (Linux) Proxmox ProxmoxPVEPVE-Firewall
How to Encrypt VNC Traffic with Putty December 9, 2015 By default, VNC is not secure protocol.VNC uses encryption during initial connection and login (passwords are not sent in plain-text). Once, we connected then all the VNC data is unencrypted and hacker could sniff our VNC session. It is better (safer) to start VNC server only on 127.0.0.1(localhost) and tunnel it… Read More
Install Rocket Chat on Centos 7with Jitsi Video Conferencing September 21, 2018 Add the epel repository and update everything. yum -y install epel-release nano && yum -y update Populate the yum repo with the mongodb-org repository nano /etc/yum.repos.d/mongodb-org.repo Paste this into the new file: [mongodb-org] name=MongoDB Repository baseurl=https://repo.mongodb.org/yum/redhat/$releasever/mongodb-org/3.6/x86_64/ gpgcheck=1 enabled=1 gpgkey=https://www.mongodb.org/static/pgp/server-3.6.asc To write and save do: CTRL-O, CTRL-X Now we need to… Read More
Setting up LDAP on Debian Distro May 16, 2012May 16, 2012 LDAP (Lightweight Directory Access Protocol) allows central user, group, domain….. authentication, information storage … Using LDAP in a local network, you can allow your users to login and authenticate from anywhere on your network. This tutorial will be split in 2 parts. In the first part, I will explain how-to… Read More