zaro

What port does Proxmox use?

Published in Proxmox Ports 3 mins read

Proxmox Virtual Environment (VE) primarily uses port 8006 for its secure web-based management interface. This port is essential for accessing the Proxmox VE web GUI, allowing administrators to manage virtual machines, containers, storage, and networking directly through a web browser.

Understanding Proxmox's Primary Web Interface Port

The Proxmox VE web interface operates on HTTPS over port 8006 by default. This dedicated port ensures a secure connection for administrative tasks, protecting sensitive data transmitted between your browser and the Proxmox server.

For remote administration of your Proxmox VE hosts, it is necessary to configure firewall rules. These rules must permit traffic from authorized remote IP addresses to the web GUI on port 8006. This secure approach helps prevent unauthorized access while enabling flexible management from various locations.

Key Ports for Proxmox VE Administration

While port 8006 is the primary access point for the web GUI, Proxmox VE relies on several other ports for its full range of functionalities and administrative access. Understanding these ports is crucial for proper network configuration and security.

Port Number Protocol Service/Purpose Description
8006 TCP Proxmox VE Web Interface (HTTPS) The default and primary port for accessing the Proxmox VE graphical user interface via a web browser.
22 TCP SSH (Secure Shell) Used for secure command-line access to the Proxmox VE host, enabling remote shell management.
80 TCP HTTP (Web Server) Typically redirects to the secure HTTPS connection on port 443 or is used for specific web services.
443 TCP HTTPS (Web Server) Standard secure web communication, often used for internal redirects or other web-based services.
5900-5999 TCP VNC (Virtual Network Computing) Range of ports used for accessing the console of individual virtual machines or containers.
3128 TCP APT Proxy Can be used for an APT proxy to cache updates for packages, speeding up deployments in larger environments.
873 TCP rsync Used for data synchronization and backup operations, especially in clustered environments or for replication.

Managing Firewall Rules for Proxmox

Proper firewall configuration is critical for securing your Proxmox VE environment. Here's how to approach it:

  • Allow Web GUI Access: Ensure that your network firewall or the Proxmox built-in firewall allows inbound traffic to port 8006 from trusted IP addresses or networks. This is essential for remote administration.
  • Secure SSH Access: Limit SSH (port 22) access to only necessary IP addresses and consider implementing SSH key-based authentication for enhanced security.
  • Internal Communication: If you are running a Proxmox cluster, specific ports (e.g., for Corosync) need to be open between cluster nodes for their communication, but these are typically internal to the cluster network.
  • Specific Service Needs: Depending on your setup (e.g., NFS shares, iSCSI targets, Ceph storage), additional ports might need to be opened to allow communication with these services.

For detailed information on configuring firewall rules, refer to the Proxmox VE Firewall documentation.

Examples and Best Practices

  • Remote Management Example: To access your Proxmox VE host from your office computer, you would typically type https://your-proxmox-ip-address:8006 into your web browser. Your network firewall would need to be configured to allow this connection.
  • Security Principle: Always follow the principle of least privilege, opening only the ports that are absolutely necessary for your operations.
  • Monitoring: Regularly monitor logs for any suspicious activity on open ports, especially 8006 and 22.
  • HTTPS: Proxmox VE defaults to HTTPS on port 8006, ensuring encrypted communication. Always verify that you are connecting via HTTPS to prevent man-in-the-middle attacks.