There are two possible rulesets for this purpose. The first one is to just accepting all the incoming traffic coming from each of the nodes of the cluster. If there are two nodes with the IPs
/etc/sysconfig/iptables file may look like the following:
# Firewall config...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.