<div class="gmail_quote">On Thu, May 13, 2010 at 8:27 AM, Tim Serong <span dir="ltr"><<a href="mailto:tserong@novell.com">tserong@novell.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
Hi,<br>
<div class="im"><br>
On 5/13/2010 at 03:56 PM, Aleksey Zholdak <<a href="mailto:aleksey@zholdak.com">aleksey@zholdak.com</a>> wrote:<br>
> > The firewall should let through the UDP multicast traffic on<br>
> > ports mcastport and mcastport+1.<br>
><br>
> As I wrote above: all interfaces in SuSEfirewall2 is set to "Internal<br>
> zone". So, how can I "open" these ports if it already opened?<br>
><br>
<br>
</div>Just to double check, I assume "Internal zone" does not have any<br>
firewall rules applied to it? If you go to "Allowed Services" in the<br>
YaST2 firewall config app, it should show everything greyed-out or<br>
allowed for Internal Zone.<br>
<br>
(Disclaimer: my major experience with SuSEfirewall2 is opening the ssh<br>
port on a system I care about, and turning the firewall off completely<br>
on my test cluster systems, because they're inside networks I trust)<br>
<br>
You said earlier that openais starts OK if you have the firewall on,<br>
but resources do not run. What does the output of "crm_mon -r1" show<br>
in this case?<br>
<br>
Regards,<br>
<br>
Tim<br>
<font color="#888888"><br>
</font><br></blockquote></div><br>As the SuSEfirewall2 firewall is based on iptables rules, I think you can run a loop such as this to get the actual configuration in place <br>for table in filter nat mangle raw ; do echo "--- $table ---"; iptables -t $table -L -n; done > /tmp/iptables.log<br>
<br>and send to the list the contents ot /tmp/iptables.log if there are no sensitive ip/information in it...<br>Or perhaps the file <i>/etc/sysconfig/SuSEfirewall2 already contains all the information needed to check configuration from an iptables point of view</i><br>
<br>HIH,<br>Gianluca<br>