Network Basics
Network Bridges
Proxmox uses Linux bridges to connect VMs and containers to networks.vmbr0
Default Bridge
- Created during Proxmox installation
- Connected to physical network interface
- Used by most containers/VMs
Custom Bridges
Additional Bridges
- Isolated networks
- VLAN separation
- Internal-only communication
Viewing Network Configuration
- Web UI
- Command Line
- Select Proxmox node
- Navigate to System → Network
- View bridges, interfaces, and bonds
Container Networking
Static IP Configuration
During Container Creation
When running a script, you can specify network settings:
- Choose Advanced Settings
- Configure static IP or DHCP
- Set gateway and DNS servers
After Container Creation (Web UI)
- Select the container
- Navigate to Network
- Edit
net0 - Set:
- IPv4:
192.168.1.100/24 - Gateway:
192.168.1.1
- IPv4:
DHCP Configuration
- Web UI
- CLI
- Container → Network
- Edit
net0 - IPv4: Set to DHCP
DNS Configuration
Set DNS servers for containers:VM Networking
Network Interface Types
VirtIO
Best Performance
- Paravirtualized driver
- Low CPU overhead
- Recommended for Linux
Intel E1000
Compatibility
- Emulated hardware
- Broader OS support
- Higher CPU usage
VMware vmxnet3
VMware Import
- For migrated VMs
- Good performance
Configure VM Network
VLANs
VLANs provide network segmentation for security and organization.VLAN-Aware Bridge
Assign VLAN to Container
- Web UI
- CLI
- Container → Network
- Edit
net0 - Set VLAN Tag (e.g., 10)
Assign VLAN to VM
Common VLAN Use Cases
IoT Devices
VLAN 10
- Home Assistant
- Smart home devices
- Isolated from main network
Guest Network
VLAN 20
- Guest Wi-Fi
- Limited access
- Internet only
Management
VLAN 99
- Proxmox host
- Network switches
- Administrative access
Servers
VLAN 30
- Web servers
- Databases
- Production services
Firewall Configuration
Enable Proxmox Firewall
Create Firewall Rules
- Web UI
- CLI
- Container/VM → Firewall → Add
- Configure:
- Direction: IN/OUT
- Action: ACCEPT/REJECT/DROP
- Protocol: TCP/UDP/ICMP
- Source/Destination
- Port
Common Firewall Rules
Allow SSH from Local Network
Allow SSH from Local Network
Allow HTTP/HTTPS
Allow HTTP/HTTPS
Block All Other Traffic
Block All Other Traffic
Allow Outbound Traffic
Allow Outbound Traffic
Advanced Networking
Multiple Network Interfaces
Add additional network interfaces:- Container
- VM
Network Bonding
Combine multiple network interfaces for redundancy or bandwidth:- balance-rr (0) - Round-robin
- active-backup (1) - Failover
- balance-xor (2) - XOR based
- 802.3ad (4) - LACP (requires switch support)
Internal-Only Network
Create isolated network for container communication:NAT and Port Forwarding
Forward external ports to containers:IPv6 Configuration
Enable IPv6
Troubleshooting
Container/VM has no network
Container/VM has no network
Check:
- Bridge configuration:
brctl show - Container network config:
pct config <CTID> - IP address:
pct enter <CTID>thenip addr - Restart network:
systemctl restart networking
Cannot ping gateway
Cannot ping gateway
Verify:
DNS not resolving
DNS not resolving
Fix DNS:
VLAN traffic not working
VLAN traffic not working
Checklist:
- Bridge is VLAN-aware
- Switch port is configured as trunk
- VLAN exists on switch
- Correct VLAN tag on container/VM
Network Monitoring
Monitor Traffic
- iftop
- nload
- vnstat
Test Network Performance
Best Practices
Plan IP Addressing
- Use consistent IP scheme
- Document assignments
- Reserve ranges for DHCP
- Use static for servers
Use VLANs
- Segment networks
- Isolate IoT devices
- Separate management
- Improve security
Enable Firewall
- Default deny incoming
- Allow only needed ports
- Log dropped packets
- Regular rule review
Monitor Traffic
- Track bandwidth usage
- Identify bottlenecks
- Detect anomalies
- Plan upgrades
Next Steps
Security Hardening
Secure your network configuration
Popular Apps
Deploy network-based applications
Docker Setup
Configure Docker networking