2022-12-13 16:10:10 -05:00
// Module included in the following assemblies:
//
2023-02-09 12:02:22 -05:00
// * microshift_networking/microshift-firewall.adoc
2022-12-13 16:10:10 -05:00
2023-10-30 10:13:25 -04:00
:_mod-docs-content-type: CONCEPT
2023-01-12 15:48:27 -05:00
[id="microshift-firewall-req-settings_{context}"]
2022-12-13 16:10:10 -05:00
= Required firewall settings
2022-12-19 16:53:44 +01:00
2025-09-30 07:55:42 -04:00
An IP address range for the node network must be enabled during firewall configuration. You can use the default values or customize the IP address range. If you choose to customize the node network IP address range from the default `10.42.0.0/16` setting, you must also use the same custom range in the firewall configuration.
2022-12-13 16:10:10 -05:00
.Firewall IP address settings
[cols="3",options="header"]
|===
|IP Range
|Firewall rule required
|Description
|10.42.0.0/16
|No
|Host network pod access to other pods
|169.254.169.1
|Yes
|Host network pod access to {product-title} API server
|===
The following are examples of commands for settings that are mandatory for firewall configuration:
.Example commands
* Configure host network pod access to other pods:
+
2023-09-06 10:14:35 -04:00
[source,terminal]
2022-12-13 16:10:10 -05:00
----
$ sudo firewall-cmd --permanent --zone=trusted --add-source=10.42.0.0/16
----
* Configure host network pod access to services backed by Host endpoints, such as the {product-title} API:
+
2023-09-06 10:14:35 -04:00
[source,terminal]
2022-12-13 16:10:10 -05:00
----
$ sudo firewall-cmd --permanent --zone=trusted --add-source=169.254.169.1
----