mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
35 lines
1.1 KiB
Plaintext
35 lines
1.1 KiB
Plaintext
// Module included in the following assemblies:
|
|
//
|
|
// * microshift_networking/microshift-firewall.adoc
|
|
|
|
:_mod-docs-content-type: PROCEDURE
|
|
[id="microshift-firewall-allow-traffic_{context}"]
|
|
= Allowing network traffic through the firewall
|
|
|
|
You can allow network traffic through the firewall by configuring the IP address range and inserting the DNS server to allow internal traffic from pods through the network gateway.
|
|
|
|
.Procedure
|
|
|
|
. Use one of the following commands to set the IP address range:
|
|
|
|
.. Configure the IP address range with default values by running the following command:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ sudo firewall-offline-cmd --permanent --zone=trusted --add-source=10.42.0.0/16
|
|
----
|
|
|
|
.. Configure the IP address range with custom values by running the following command:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ sudo firewall-offline-cmd --permanent --zone=trusted --add-source=<custom IP range>
|
|
----
|
|
|
|
. To allow internal traffic from pods through the network gateway, run the following command:
|
|
+
|
|
[source,terminal]
|
|
----
|
|
$ sudo firewall-offline-cmd --permanent --zone=trusted --add-source=169.254.169.1
|
|
----
|