lkiesow::weblog

Random notes from a security-aware software engineer, open-source advocate and occasional lecturer.


Part 2 – Internal Network Magic

Now that we have our basic setup done, we can get to the tricky part of setting up an internal network for our Proxmox server.

In the University environment, this has the advantage of us being able to do whatever we want inside the network and just having a single ingress and egress node which interacts with the external network. This especially means that we can have IP autoconfiguration, which makes spinning up machines so much easier.

Of course, having an internal network can also act as a natural barrier of protection, since no one route directly to the machines and attack them. For example, even with the planned open set-up, if someone spins up a MariaDB server without authentication, no one can exploit that from the outside since no one can connect to the server.

Create an Internal Network

The first step is, to actually create the internal network by creating a new network interface on our Proxmox server and assign it a network. This network bridge can then later be used to put machines on the internal network:

This gives us a fully functional internal network to use. That’s a good foundation for our next steps.

DHCP and DNS Server for the Internal Network

While having a network is the foundation we need, we do want autoconfiguration for this. That is why next, we configure dnsmasq to handle both:

Having this makes spinning up machines a breeze. What is left is access from the external network.

HTTP(S) Reverse Proxy for Internal Machines

Most services we run today are being accessed via HTTPS. This means allowing this one protocol from the outside to get to internal machines will already allow us to handle most use-cases with no additional network configuration. We can easily configure Nginx as a reverse proxy for doing this. In fact, we kind of already did with the Proxmox web interface. So, we just need to repeat this in a slightly more generic way:

SSH Jump Host for Internal Proxmox Network

Finally, all that is left is to provide an easy way for developers to connect to internal machines. Luckily, SSH can use jump hosts as intermediary when connecting to a target. This means, we just need a single host on the internal network which is accessible from the outside:

With this, our basic Proxmox server setup is done. All that is left is to create some accounts and hand them out to users to use what you havebuilt.

Good luck with your set-up.

◀ Back