When you deploy the Application, Directory or Loader servers
on RHEL as part of a distributed installation, configure the firewall
on each RHEL server to allow communication to and from each of the
other servers, regardless of the operating system.
About this task
To allow distributed installations with Application, Loader
or Directory Servers on RHEL, configure the IPTables service on the
RHEL system by using the IP addresses of the other servers as follows:
Procedure
- Determine if the firewall is enabled.
Note: If the firewall is not
enabled, you do not need to complete the following instructions. Ignore
the remainder of this section.
-
Allow a server through the RHEL firewall by editing the
/etc/sysconfig/iptables-config file as user
root and
specifying the server IP address. For each server, place an entry similar to the following after the
first -A RH-Firewall entry in the file:
A RH-Firewall-1-INPUT -p all -s <IP address> -j ACCEPT
This
entry allows access from the specified server through the firewall on all ports.
- Ensure that you add the following ports to allow clients
to access the application server and alarms component. Enter each
entry on a single line.
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -dport
<ASHTTPPORT> -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -dport
<ASJRMPINVOKPORT> -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -dport
<ORACLEPORT> -j ACCEPT
-
Substitute the correct port numbers for
<ASHTTPPORT>,
<ASJRMPINVOKPORT>, and <ORACLEPORT>. Here is an example of
how the /etc/sysconfig/iptables-config file looks afterward:
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p all -s <IP address> -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 8080 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 4444 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1521 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
- Run the command as user
root:
# service iptables restart