-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible update in docs #22
Comments
I myself have never had to open any internal firewall ports. But I think I may have followed some old guidance on disabling iptables/firewall as it's an internal only resource and I lock down the external access on firewalls elsewhere. My point is, we will gladly add a working configuration to the docs. Can you give more detail on where you're unblocking those ports, perhaps an example of the rule and how to add it? And then we can link to official nftables docs for more detail. We may also want to provide better detail from a security standpoint as opening that wide a range of ports is typically not the best approach. |
Hi @darksidemilk. Thanks for the answer. My scenario is a flat network where Fog Server and Storage are on the same VM. After testing, for the production server I setup the packet filter, in my case it was nftables, but it could be anyone else, iptables, ufw, firewalld etc. The most important thing is to know the correct port range. The range I'm referring to is item 2 - TFTP boot, on the page in question. At "from clients to storage" bullet. I thought if the range used by the client to download the image for deploy from the TFTP server would be defined in the source code, then it would just be necessary to specify this range in the documentation. In this case, the TFTP client is a third party client, separate from the Fog client? I will research more and perform packet captures to understand exactly the ports used in the image deploy and capture process and then open a PR. |
Hi.
At page https://github.com/FOGProject/fog-docs/blob/master/docs/kb/reference/network-and-firewall-requirements.md, section 2, the text suggests open the udp ports 1024 to 65535. On my tests with nftables and FOG Version 1.5.10 on Debian 11, the image deploy only worked after allow the high tcp ports. In my case I allowed the port range 49152-65535. If some other one could also test and validate that, it will be interesting add that to page afore mentioned.
Att.
The text was updated successfully, but these errors were encountered: