Firewall Rules for Red Hat OpenStack Platform
List of required ports and protocols.
OpenStack Documentation Team
rhos-docs@redhat.com
Abstract
Making open source more inclusive
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
Part I. Firewall Rules for Red Hat OpenStack Platform
This document includes a link to the Red Hat OpenStack Platform (RHOSP) network flow matrix. Use this information to help you define firewall rules.
The matrix lists RHOSP core services and their dependencies and describes the ports and protocols they use and the associated traffic flows. It includes the following columns:
- Service
- The OpenStack service.
- Protocol
- Transmission protocol.
- Dest. Port
- Destination port.
- Source Object
- Source of data.
- Dest. Object
- Destination of data.
- Source/Dest Pairs
- Valid source and destination pairs.
- Dest. Network
- Destination network.
- ServiceNetMap Parent
- Determines the network type used for each service.
- Traffic Description
- Notes about the traffic flow.
1. Using the Red Hat OpenStack Network Flow Matrix
The network flow matrix is a comma separated values (CSV) file that describes flows to and from Red Hat OpenStack Platform (RHOSP) services.
The network flow matrix describes common traffic flows. It does not describe every possible service and flow. Some flows that are not described in this matrix might be critical to operation.
For example, if you block all traffic and then selectively open only the flows described here, you might unintentionally block a necessary flow. That could cause issues that are difficult to troubleshoot.
Procedure
Use the following link to download the matrix:
Red Hat OpenStack Network Flows.
For example, right click the link and choose
Save link as
.-
Ensure that the downloaded file has the .csv filename extension. For example, if it is
.txt
, change it to.csv
. -
Use the information in the file to help you formulate firewall rules. You can open it in a spreadsheet application that accepts
.csv
files, or access it with your own program.