My use-case for Qubes is largely to help segment my work/personal systems as well as allow me to run VMs for development. That second part is a bit of a challenge, though. By design, whenever I spin up a new VM, I have to explicitly allow ports between the VM and my existing systems. I 100% understand why this is the case from a security perspective. However, for my use-case, I'd like the sys-firewall to behave more like a traditional hypervisor like ESXi.
With full acknowledgement that my question goes against the default security principles of Qubes, what firewall rules would I need to configure to allow full networking between my VMs? By no means am I an iptables guru, so I need a little help . . . Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f9af459a-c46e-428a-b648-86a7210bbdd3%40googlegroups.com.
