import type { Metadata } from "next" import { Shield } from "lucide-react" import CopyableCode from "@/components/CopyableCode" export const metadata: Metadata = { title: "ProxMenux Post-Install: Security Settings", description: "Comprehensive guide to Security Settings in the ProxMenux post-install script for enhancing Proxmox VE security.", openGraph: { title: "ProxMenux Post-Install: Security Settings", description: "Comprehensive guide to Security Settings in the ProxMenux post-install script for enhancing Proxmox VE security.", type: "article", url: "https://macrimi.github.io/ProxMenux/docs/post-install/security", images: [ { url: "https://macrimi.github.io/ProxMenux/security-settings-image.png", width: 1200, height: 630, alt: "ProxMenux Post-Install Security Settings", }, ], }, twitter: { card: "summary_large_image", title: "ProxMenux Post-Install: Security Settings", description: "Comprehensive guide to Security Settings in the ProxMenux post-install script for enhancing Proxmox VE security.", images: ["https://macrimi.github.io/ProxMenux/security-settings-image.png"], }, } function StepNumber({ number }: { number: number }) { return (
{number}
) } export default function SecuritySettingsPage() { return (

Security Settings

The Security Settings category focuses on enhancing the security of your Proxmox VE installation. These settings are crucial for protecting your virtualization environment from potential threats and unauthorized access.

Available Optimizations

Disable portmapper/rpcbind

This optimization disables the portmapper/rpcbind service for improved security.

Why it's beneficial: Disabling unnecessary services like portmapper/rpcbind reduces the attack surface of your system. This service is often not needed in modern environments and can be a potential security risk if left enabled.

This adjustment automates the following commands:

Install Lynis Security Tool

This optimization installs Lynis, a powerful security auditing tool for Unix-based systems.

Why it's beneficial: Lynis helps identify security vulnerabilities, configuration errors, and provides recommendations for system hardening. Regular security audits with Lynis can significantly improve your system's overall security posture.

This adjustment automates the following commands:

Protect Web Interface with fail2ban

This optimization installs and configures fail2ban to protect the Proxmox VE web interface from brute-force attacks.

Why it's beneficial: fail2ban helps prevent unauthorized access attempts by temporarily banning IP addresses that show malicious signs, such as too many password failures. This adds an extra layer of security to your Proxmox VE web interface.

This adjustment automates the following commands:

/etc/fail2ban/filter.d/proxmox.conf [Definition] failregex = pvedaemon\[.*authentication failure; rhost= user=.* msg=.* ignoreregex = EOF # Configure Proxmox jail cat < /etc/fail2ban/jail.d/proxmox.conf [proxmox] enabled = true port = https,http,8006,8007 filter = proxmox logpath = /var/log/daemon.log maxretry = 3 bantime = 3600 findtime = 600 EOF # Configure general fail2ban settings cat < /etc/fail2ban/jail.local [DEFAULT] ignoreip = 127.0.0.1 bantime = 86400 maxretry = 2 findtime = 1800 [ssh-iptables] enabled = true filter = sshd action = iptables[name=SSH, port=ssh, protocol=tcp] logpath = /var/log/auth.log maxretry = 2 findtime = 3600 bantime = 32400 EOF # Enable and restart fail2ban service systemctl enable fail2ban systemctl restart fail2ban `} />

Automatic Application

All of these optimizations are automatically applied when selected in the Security section. This automation ensures that these beneficial settings are applied consistently and correctly, saving time and reducing the potential for human error during manual configuration.

) }