Accessing Internal Machines on pve System via External Network#
First, install frpc using the link below.
Here are some tutorials on using frp.
One-click Installation of frpc#
stilleshan/frpc: One-click installation and uninstallation script and docker image for frpc, a client for frp, the intranet penetration tool. Supports deployment in various environments such as Synology NAS, Linux servers, and docker. (github.com)
stilleshan/frps: One-click installation and uninstallation script and docker image for frps, a server for frp, the intranet penetration tool. Supports deployment in various environments such as Linux servers and docker. (github.com)
Frp-frp reverse proxy implementation of the https protocol - shookm - 博客园 (cnblogs.com)
Configure pve#
The command below allows you to avoid HTTP access errors when using frp proxy, but you may still encounter HTTPS certificate errors. I haven't figured out a solution for this yet, but as long as it works, it's fine.
iptables -t nat -I PREROUTING -i pppoe-wan -p tcp --dport 8006 -j DNAT --to-destination 192.168.x.xx:8006
Then, you can set up a domain name and add an A record to your frps server. This way, you can access your pve backend interface using the domain name and the forwarding port you set.