mirror of
https://github.com/Rudd-O/qubes-network-server.git
synced 2025-03-01 14:22:35 +01:00
Improve user documentation.
This commit is contained in:
parent
3f58f6bda6
commit
da69c75642
34
README.md
34
README.md
@ -73,36 +73,48 @@ the software is straightforward.
|
|||||||
|
|
||||||
These sample instructions assume:
|
These sample instructions assume:
|
||||||
|
|
||||||
* you understand the distinction between dom0 and qubes
|
* the software is properly installed (see below),
|
||||||
* you already have an AppVM VM set up, named `testvm`,
|
* you understand the distinction between dom0 and qubes,
|
||||||
|
* you already have an AppVM VM set up, named `testvm`, and
|
||||||
* your `sys-net` VM is attached to a network with subnet `192.168.16.0/24`
|
* your `sys-net` VM is attached to a network with subnet `192.168.16.0/24`
|
||||||
— this, of course, may vary depending on your local router configuration.
|
— this, of course, may vary depending on your local router configuration.
|
||||||
|
|
||||||
*Do not proceed any further if you do not yet meet these requirements.*
|
*Do not proceed any further if you do not yet meet these requirements.*
|
||||||
|
|
||||||
First, attach the VM you want to expose to the network
|
First, **attach** the VM you want to expose to the network
|
||||||
to a NetVM that has an active network connection:
|
to a NetVM that has an active network connection:
|
||||||
|
|
||||||
`qvm-prefs -s testvm netvm sys-net`
|
`qvm-prefs -s testvm netvm sys-net`
|
||||||
|
|
||||||
Then, set an IP address on the VM:
|
Set an **IP** address on `testvm` belonging to the same LAN as `sys-net`:
|
||||||
|
|
||||||
`qvm-prefs -s testvm ip 192.168.16.25`
|
`qvm-prefs -s testvm ip 192.168.16.25`
|
||||||
|
|
||||||
(The step above requires you restart the `testvm` VM if it was running.)
|
**Restart** the `testvm` VM if it was already running.
|
||||||
|
|
||||||
Then, to enable the network server feature for your `testvm` VM, all you have
|
**Configure** routing method; to enable the network server feature for
|
||||||
to do in your AdminVM (`dom0`) is run the following command:
|
your `testvm` VM, all you have to do in your AdminVM (`dom0`) is run
|
||||||
|
the following command:
|
||||||
|
|
||||||
`qvm-features testvm routing-method forward`
|
`qvm-features testvm routing-method forward`
|
||||||
|
|
||||||
Now `testvm` is exposed to the network with address `192.168.16.25`, as well
|
Now `testvm` is exposed to the network with address `192.168.16.25`, as well
|
||||||
as to other VMs attached to `NetVM`.
|
as to other VMs attached to `NetVM`.
|
||||||
|
|
||||||
Do note that `testvm` will have the standard Qubes OS firewall rules stopping
|
Finally, adjust **input firewall rules** on `testvm` to permit traffic coming from
|
||||||
inbound traffic. To solve that issue, you can
|
machines in your LAN. `testvm` will have the standard Qubes OS firewall
|
||||||
[use the standard `rc.local` Qubes OS mechanism to alter the firewall rules](https://www.qubes-os.org/doc/firewall/#where-to-put-firewall-rules)
|
rules stopping inbound traffic. To solve that issue, you can use a sample
|
||||||
in your `testvm` AppVM.
|
rule in `testvm`:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo nft add rule qubes custom-input ip saddr 192.168.16.0/24 ct state new,established,related counter accept
|
||||||
|
```
|
||||||
|
|
||||||
|
You can make these rules persistent by [following instructions on the Qubes
|
||||||
|
OS firewall documentation page](https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes).
|
||||||
|
Note that you do not need to change the `custom-forward` chain at all
|
||||||
|
on any qube -- Qubes network server manages that for you transparently
|
||||||
|
in your `NetVM`.
|
||||||
|
|
||||||
Here are documents that will help you take advantage of Qubes network server:
|
Here are documents that will help you take advantage of Qubes network server:
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user