Abstract
How to install and set up Proxmox for the first time.
How to do?
1. Download & Install Proxmox
https://www.proxmox.com/en/downloads/category/iso-images-pve
2. Access Web page
https://[IP]:8006
3. comment out apt enterprise source list
vi /etc/apt/sources.list.d/pve-enterprise.list : comment out #deb https://enterprise.proxmox.com/debian/pve bullseye pve-enterprise
4. Add apt source list for non-subscribe & apt update
vi /etc/apt/sources.list # Add Line 5-6 1 deb http://ftp.kr.debian.org/debian bullseye main contrib 2 3 deb http://ftp.kr.debian.org/debian bullseye-updates main contrib 4 5 # No subscription 6 deb http://download.proxmox.com/debian/pve bullseye pve-no-subscription 7 8 # security updates 9 deb http://security.debian.org bullseye-security main contrib apt update apt upgrade -y
5. Remove subscription notification message
vi /usr/share/javascript/proxmox-widget-toolkit/proxmoxlib.js # modify Line 515 # AS-IS : Ext.Meg.show({ # TO-BE : void({ 513 if (res === null || res === undefined || !res || res 514 .data.status.toLowerCase() !== 'active') { 515 void({ 516 title: gettext('No valid subscription'), systemctl restart pveproxy.service
6. adjust LVM capacity
# check partition df -h fdisk -l vgdisplay -v # Delete /dev/pve/data lvremove /dev/pve/data # extend capacity /dev/pve/root lvextend -l +100%FREE /dev/pve/root resize2fs -p /dev/pve/root # re-check partition df -h fdisk -l vgdisplay -v
7. setup network
vi /etc/network/interfaces 12 auto lo 13 iface lo inet loopback 14 15 iface eno1 inet manual 16 17 iface eno2 inet manual 18 19 auto vmbr0 20 iface vmbr0 inet static 21 address [PUBLIC IP]/[NETMASK] 22 gateway [GATEWAY] 23 bridge-ports eno1 24 bridge-stp off 25 bridge-fd 0 26 27 auto vmbr100 28 iface vmbr100 inet static 29 address [PRIVATE IP]/[NETMASK] 30 bridge-ports none 31 bridge-stp off 32 bridge-fd 0 33 /etc/network/interfaces
8. setup iptables rules
# install netfilter-persistent apt install netfilter-persistent # save persistent iptables rules netfilter-persistent save # iptables file vi /etc/iptables/rules.v4 # Default rules iptables -A INPUT -i lo -j ACCEPT iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT iptables -A INPUT -s [Office IP]/24 -j ACCEPT iptables -A INPUT -s [Access IP]/32 -j ACCEP iptables -P INPUT DROP # NAT rules iptables -A PREROUTING -d [Host IP]/32 -p tcp -m tcp --dport [Host Port] -j DNAT --to-destination [Guest IP]:[Guest Port] iptables -A POSTROUTING -s [Guest Network]/24 -j MASQUERADE
9. Done.
Access web page & enjoy 😊
Reference
https://blog.djjproject.com/723
https://malwareanalysis.tistory.com/191
https://blog.cyberhacktics.com/virtual-machine-tips-and-tricks-1-transferring-files/