banner
xingli

xingli

猫娘爱好者

Accessing internal machines from the outside network in PVE system settings.

Accessing Internal Machines on pve System via External Network#

First, install frpc using the link below.
Here are some tutorials on using frp.

One-click Installation of frpc#

stilleshan/frpc: One-click installation and uninstallation script and docker image for frpc, a client for frp, the intranet penetration tool. Supports deployment in various environments such as Synology NAS, Linux servers, and docker. (github.com)
stilleshan/frps: One-click installation and uninstallation script and docker image for frps, a server for frp, the intranet penetration tool. Supports deployment in various environments such as Linux servers and docker. (github.com)
Frp-frp reverse proxy implementation of the https protocol - shookm - 博客园 (cnblogs.com)

Configure pve#

The command below allows you to avoid HTTP access errors when using frp proxy, but you may still encounter HTTPS certificate errors. I haven't figured out a solution for this yet, but as long as it works, it's fine.

iptables -t nat -I PREROUTING -i pppoe-wan -p tcp --dport 8006 -j DNAT --to-destination 192.168.x.xx:8006

Then, you can set up a domain name and add an A record to your frps server. This way, you can access your pve backend interface using the domain name and the forwarding port you set.
img

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.