My use-case for Qubes is largely to help segment my work/personal systems 
as well as allow me to run VMs for development. That second part is a bit 
of a challenge, though. By design, whenever I spin up a new VM, I have to 
explicitly allow ports between the VM and my existing systems. I 100% 
understand why this is the case from a security perspective. However, for 
my use-case, I'd like the sys-firewall to behave more like a traditional 
hypervisor like ESXi.

With full acknowledgement that my question goes against the default 
security principles of Qubes, what firewall rules would I need to configure 
to allow full networking between my VMs? By no means am I an iptables guru, 
so I need a little help . . .

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f9af459a-c46e-428a-b648-86a7210bbdd3%40googlegroups.com.

Reply via email to