Announcement

Collapse
No announcement yet.

How to Passthrough USB Devices to Proxmox VE 8 Virtual Machines (VMs)

Collapse
X
Collapse
  •  

  • How to Passthrough USB Devices to Proxmox VE 8 Virtual Machines (VMs)


    You can passthrough USB devices from your Proxmox VE host to any of your Proxmox VE virtual machines (VMs) and access the USB devices from the Proxmox VE virtual machines in the same way as you do on any other computers.

    In this article, I will show you how to passthrough USB devices to a Proxmox VE virtual machine (VM) and access it from the virtual machine.



    Table of Contents

    1. Enabling USB Hotplug for Proxmox VE Virtual Machines (VMs)
    2. Proxmox VE USB Passthrough Methods
    3. Passthrough USB Devices to Proxmox VE Virtual Machines (VMs)
    4. Accessing the USB Device in the Proxmox VE Virtual Machine (VM)
    5. Removing the USB Device from the Proxmox VE Virtual Machine (VM)
    6. Conclusion
    7. References



    Enabling USB Hotplug for Proxmox VE Virtual Machines (VMs)

    USB Hotplug is a feature of Proxmox VE that allows you to add/remove USB devices in the virtual machine on the fly (even when the virtual machine is powered on). I highly recommend you to enable USB Hotplug on the Proxmox VE virtual machines where you need access to different USB devices.



    To configure Hotplug settings for a Proxmox VE virtual machine, navigate to the Options section of the VM[1], select Hotplug[2] and click on Edit[3].





    Make sure USB is selected in the Hotplug settings[1]. Once you’re done, click on OK to save the changes[2].

    In my case, USB Hotplug is already enabled. So, the OK button is disabled as no changes are made.







    Proxmox VE USB Passthrough Methods

    You can passthrough your USB devices on Proxmox VE virtual machines in one of two ways:
    • Using Vendor/Device ID of the USB device: If you use this method to passthrough a USB device on a Proxmox VE virtual machine, the USB device will be accessible from the VM regardless of the physical USB port (of your Proxmox VE host) you’ve connected the USB device to. You can call this USB Device Passthrough as well.
    • Using Host Bus and Port ID of the USB Port the USB Device is Connected to: If you use this method to passthrough a USB device on a Proxmox VE virtual machine, any USB device connected to the same physical USB port of your Proxmox VE host will be accessible from the VM. Unlike Vendor/Device ID USB passthrough, if you connect the same USB device in a different physical USB port of your Proxmox VE host, the device won’t be accessible from the VM. The problem with this method is that you may accidentally connect a wrong USB device on your Proxmox VE VM. The advantage of this method is that you can passthrough one or more physical USB ports of your Proxmox VE host on a Proxmox VE virtual machine and access any USB devices connected to those physical USB ports from the virtual machine without any configuration change. You can call this USB Port Passthrough as well.



    Passthrough USB Devices to Proxmox VE Virtual Machines (VMs)

    First, insert your desired USB device in any of the USB port of your Proxmox VE host.

    To passthrough the USB device to a Proxmox VE virtual machine, navigate to the Hardware section of the Proxmox VE virtual machine[1], and click on Add > USB Device[2].





    To passthrough a specific USB device to the Proxmox VE virtual machine, select Use USB Vendor/Device ID[1] and select your desired USB device from the dropdown menu[2].





    To passthrough a specific physical USB port (of your Proxmox VE host) and the USB device connected to the port on the Proxmox VE virtual machine, select Use USB Port[1] and select your desired USB device from the dropdown menu[2].





    Once you’ve selected your desired USB device/port for passthrough[1], click on Add[2].





    The USB device/port should be added to the Proxmox VE virtual machine.







    Accessing the USB Device in the Proxmox VE Virtual Machine (VM)

    Once you’ve added the USB device/port to the Proxmox VE virtual machine, you should be able to access it from the virtual machine as usual.





    Removing the USB Device from the Proxmox VE Virtual Machine (VM)

    Once you’re done working with the USB device, you can disconnect it from your Proxmox VE host or remove the USB device from the virtual machine.

    To remove the USB device from the Proxmox VE virtual machine, select the USB device from the Hardware section of the virtual machine[1] and click on Remove[2].





    Click on Yes to confirm the action.

    The USB device should be removed from the Proxmox VE virtual machine.





    Conclusion

    In this article, I have shown you how to passthrough a USB device or a physical USB port of your Proxmox VE host on a Proxmox VE virtual machine and access the USB device from the virtual machine. I have also shown you how to remove the USB device/port from the Proxmox VE virtual machine.



    References






    More...
      Posting comments is disabled.

    Categories

    Collapse

    Article Tags

    Collapse

    There are no tags yet.

    Latest Articles

    Collapse

    • HAProxy on Ubuntu: Load Balancing and Failover for Resilient Infrastructure
      by Kasimba



      by german.suarez


      Introduction

      In today’s fast-paced digital landscape, ensuring the availability and performance of applications is paramount. Modern infrastructures require robust solutions to distribute traffic efficiently and maintain service availability even in the face of server failures. Enter HAProxy, the de facto standard for high-performance load balancing and failover.


      This article...
      Today, 03:00 PM
    • Providing a license for package sources
      by Kasimba
      Arch Linux hasn't had a license for any package sources (such as PKGBUILD files) in the past, which is potentially problematic. Providing a license will preempt that uncertainty.

      In RFC 40 we agreed to change all package sources to be licensed under the very liberal 0BSD license. This change will not limit what you can do with package sources. Check out the RFC for more on the rationale and prior discussion.

      Before we make this change, we will provide contributors with...
      11-19-2024, 09:21 AM
    • Linux Binary Analysis for Reverse Engineering and Vulnerability Discovery
      by Kasimba



      by George Whittaker


      Introduction

      In the world of cybersecurity and software development, binary analysis holds a unique place. It is the art of examining compiled programs to understand their functionality, identify vulnerabilities, or debug issues—without access to the original source code. For Linux, which dominates servers, embedded systems, and even personal computing, the skill of binary analysis is...
      11-18-2024, 07:10 PM
    • Ubuntu vs Debian: Linux Distributions Compared Deep Dive
      by Kasimba
      Debian and Ubuntu are two popular Linux distributions. In this deep dive we will guide you on the key differences between them from perspective of both corporate enterprise and personal productivity or pleasure usage. After reading this blog post you should be in a better position to decide to select Ubuntu or Debian.
      Stewardship, Licensing, Community and Cost

      Where as Debian is 100% fully committed to free software as defined by the Debian Free Software Guidelines, Ubuntu is created...
      11-17-2024, 08:30 PM
    • Debian Backup and Recovery Solutions: Safeguard Your Data with Confidence
      by Kasimba



      by George Whittaker


      Introduction

      In the digital age, data loss is a critical concern, and effective backup and recovery systems are vital for any Debian system administrator or user. Debian, known for its stability and suitability in enterprise, server, and personal computing environments, offers a multitude of tools for creating robust backup and recovery solutions. This guide will explore these solutions,...
      11-13-2024, 05:30 PM
    • Installing Development Tools on Debian: Setting Up Compilers, Libraries, and IDEs for a Robust Development Environment
      by Kasimba



      by George Whittaker


      Introduction

      Debian is one of the most trusted and stable Linux distributions, making it a top choice among developers and system administrators. Setting up a powerful development environment on Debian involves installing the right tools, compilers, libraries, and Integrated Development Environments (IDEs) that can support various programming languages and workflows. This guide provides...
      11-07-2024, 11:22 PM
    Working...
    X