1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00
Files
openshift-docs/modules/microshift-firewall-allow-traffic.adoc
2023-10-30 10:13:25 -04:00

35 lines
1.1 KiB
Plaintext

// Module included in the following assemblies:
//
// * microshift_networking/microshift-firewall.adoc
:_mod-docs-content-type: PROCEDURE
[id="microshift-firewall-allow-traffic_{context}"]
= Allowing network traffic through the firewall
You can allow network traffic through the firewall by configuring the IP address range and inserting the DNS server to allow internal traffic from pods through the network gateway.
.Procedure
. Use one of the following commands to set the IP address range:
.. Configure the IP address range with default values by running the following command:
+
[source,terminal]
----
$ sudo firewall-offline-cmd --permanent --zone=trusted --add-source=10.42.0.0/16
----
.. Configure the IP address range with custom values by running the following command:
+
[source,terminal]
----
$ sudo firewall-offline-cmd --permanent --zone=trusted --add-source=<custom IP range>
----
. To allow internal traffic from pods through the network gateway, run the following command:
+
[source,terminal]
----
$ sudo firewall-offline-cmd --permanent --zone=trusted --add-source=169.254.169.1
----