Getting Started

Proxmox Default Port and Login: Accessing Your Server for the First Time

Learn about the Proxmox VE default port 8006, how to access the web interface, default login credentials, first login steps, changing the root password, creating non-root users, and disabling root SSH access.

ProxmoxR app icon

Managing Proxmox? Try ProxmoxR

Monitor and control your VMs & containers from your phone.

Try Free

Connecting to Proxmox VE After Installation

Once Proxmox VE is installed and the server has rebooted, you will see a console screen displaying the management URL. This is your gateway to the web-based management interface where you will spend most of your time administering the system. Here is everything you need to know about accessing your Proxmox server for the first time.

The Default Port: 8006

Proxmox VE's web interface listens on TCP port 8006 using HTTPS. This is the only port you need to access the full management UI. Open a web browser on any device connected to the same network and navigate to:

https://<your-server-ip>:8006

For example, if your Proxmox server's IP address is 192.168.1.100:

https://192.168.1.100:8006

Your browser will warn you about an untrusted SSL certificate — this is expected because Proxmox generates a self-signed certificate during installation. You can safely proceed past this warning. Later, you can replace the certificate with a trusted one from Let's Encrypt or your own CA.

Default Login Credentials

The login screen presents two fields: Username and Password, along with a Realm dropdown and a Language selector.

  • Username: root
  • Password: The password you set during the installation wizard
  • Realm: Linux PAM standard authentication (also written as root@pam)

There is no factory default password. The root password is whatever you entered during the Proxmox installation process. If you have forgotten it, you will need to boot into single-user mode to reset it (see below).

Resetting a Forgotten Root Password

If you cannot remember the root password, you can reset it from the physical console or through IPMI/iKVM:

# 1. Reboot the server
# 2. At the GRUB menu, press 'e' to edit the boot entry
# 3. Find the line starting with 'linux' and append: init=/bin/bash
# 4. Press Ctrl+X or F10 to boot
# 5. Remount the filesystem as read-write
mount -o remount,rw /

# 6. Set a new password
passwd root

# 7. Reboot
reboot -f

First Login Steps

After logging in successfully, take a moment to familiarize yourself with the interface. The left panel shows your data center, nodes, and any VMs or containers. The main area shows details for whatever you have selected. Before doing anything else, address these immediate priorities:

1. Change the Root Password (If Needed)

If you set a simple password during installation, change it now. Navigate to Datacenter > Permissions > Users, select root@pam, and click "Password." Alternatively, use the command line:

passwd root

2. Create a Non-Root User

Running everything as root is a security risk. Create a dedicated admin user with appropriate permissions:

# Create a new Linux PAM user
useradd -m -s /bin/bash adminuser
passwd adminuser

# In the Proxmox web UI:
# 1. Go to Datacenter > Permissions > Users
# 2. Click "Add" and create the user with realm "Linux PAM"
# 3. Go to Datacenter > Permissions
# 4. Click "Add" > "User Permission"
# 5. Set Path: /, User: adminuser@pam, Role: Administrator

You can also use Proxmox VE Authentication Server (PVE) realm to create users that exist only within Proxmox:

# Via the command line
pveum user add admin@pve -comment "Admin User"
pveum passwd admin@pve
pveum acl modify / -user admin@pve -role Administrator

3. Disable Root SSH Access

Once you have a working non-root user, disable direct root SSH login to reduce your attack surface:

# Edit the SSH configuration
nano /etc/ssh/sshd_config

# Find and change this line:
# PermitRootLogin yes
# To:
PermitRootLogin no

# Restart SSH
systemctl restart sshd

Make sure you can log in with your non-root user via SSH before making this change. You can still use su - or sudo to elevate privileges after logging in with a regular account.

Other Important Ports

While port 8006 is the primary interface, Proxmox uses several other ports you should be aware of:

Port    | Service              | Purpose
--------|----------------------|---------------------------
8006    | pveproxy             | Web UI and API
3128    | SPICE proxy          | SPICE remote console
5900-5999| VNC                 | VNC console connections
22      | SSH                  | Secure shell access
111     | rpcbind              | NFS (if configured)
5404-5405| Corosync            | Cluster communication

Securing Your Access

Beyond creating non-root users and disabling root SSH, consider enabling two-factor authentication for all admin accounts. Proxmox supports TOTP (compatible with apps like Google Authenticator) and WebAuthn/U2F hardware keys. Navigate to Datacenter > Permissions > Two Factor to set this up.

For managing your Proxmox server remotely, the web interface works well in a mobile browser, but dedicated tools like ProxmoxR provide a more streamlined mobile experience. Having quick mobile access to your server's status is especially useful for monitoring during the initial setup phase when you may be frequently stepping away from your desk.

With these initial steps complete — a strong root password, a non-root admin user, disabled root SSH, and two-factor authentication — your Proxmox server is ready for production use with a solid security foundation.

Take Proxmox management mobile

All the features discussed in this guide — accessible from your phone with ProxmoxR. Real-time monitoring, power control, firewall management, and more.

ProxmoxR

Manage Proxmox from your phone

Monitor, control, and manage your clusters on the go.

Free 7-day trial · No credit card required