On Thu, Dec 12, 2013 at 5:01 PM, Juan Pablo Lorier <jplor...@gmail.com> wrote:
...
> # nfs
> -A INPUT -p tcp -m tcp --dport 111   -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 38467 -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 2049  -j ACCEPT
> -A INPUT -p udp -m udp --dport 2049  -j ACCEPT
> -A INPUT -p udp -m udp --dport 41729  -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 48491  -j ACCEPT
> -A INPUT -p udp -m udp --dport 43828  -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 48491  -j ACCEPT
> -A INPUT -p udp -m udp --dport 47492  -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 58837  -j ACCEPT

The above rules might break after a reboot.

Best practice is to set the normally dynamic nfs ports to fixed
values in /etc/sysconfig/nfs and then open those ports in the firewall.

>
> Now I'm changing the settings by overriding the defaults in the domain
> and auto negotiating the protocol. This firewall correction may be a
> good thing to add in the deploy.

Are you doing this on a node or on your engine server?

The engine-setup configured both /etc/sysconfig/nfs and iptables for me
on my engine server (for the iso domain).
_______________________________________________
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users

Reply via email to