- Server operating system version
- Debian 10.0
- Plesk version and microupdate number
- Plesk Obsidian v18.0.68_build1800250319.12
I have a management server with a public IP address, and I want to give my VMs, all of which are accessible internally with a 10-series IP address and don't have a public Internet connection, access to the internet so that updates, etc., are possible, but they aren't accessible from outside.
I found the following solution:
Now only one firewall entry needs to be changed which looks like this and this is exactly where I think the problem lies:
As far as I remember, Plesk uses IPTables and overwrites the rules whenever a change occurs.
Is there a way to implement the above rule in Plesk, or do I need to create a separate VM that is solely responsible for network operations?
I am grateful for any answers or suggestions.
I found the following solution:
Code:
In: /etc/sysctl.conf
Change: net.ipv4.ip_forward=1
Save: sysctl -p
Now only one firewall entry needs to be changed which looks like this and this is exactly where I think the problem lies:
Code:
apt install netfilter-persistent
netfilter-persistent save
iptables -t nat -A POSTROUTING -s <ip-net> -o <interface> -j MASQUERADE
As far as I remember, Plesk uses IPTables and overwrites the rules whenever a change occurs.
Is there a way to implement the above rule in Plesk, or do I need to create a separate VM that is solely responsible for network operations?
I am grateful for any answers or suggestions.