Skip to content

Commit 6d9c443

Browse files
committed
add firewall config
1 parent 14cbc7b commit 6d9c443

File tree

2 files changed

+39
-0
lines changed

2 files changed

+39
-0
lines changed
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Configuring Your Firewall
3+
---
4+
5+
<head>
6+
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/>
7+
</head>
8+
9+
10+
If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments.
11+
12+
13+
14+
## Outbound Internet Access Requirements
15+
16+
Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services.
17+
18+
Set the following registry URLs for your firewall’s allowlist:
19+
20+
| URL | Port | Function |
21+
|------------------------------------|------|---------------------------------------------------------------------------|
22+
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |
23+
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |
24+
| `docker.io` | 443 | Provides community container images used by optional Rancher features |
25+
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry |
26+
27+
28+
## Inbound Access Requirements
29+
30+
External clients and managed clusters require inbound access to the Rancher server.
31+
32+
| Port | Protocol | Source | Purpose |
33+
|------|----------|-------------------------|-------------------------------------------------|
34+
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) |
35+
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API |
36+
37+
38+
- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed.

sidebars.js

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -789,6 +789,7 @@ const sidebars = {
789789
],
790790
},
791791
"how-to-guides/advanced-user-guides/open-ports-with-firewalld",
792+
"how-to-guides/advanced-user-guides/configure-your-firewall",
792793
"how-to-guides/advanced-user-guides/tune-etcd-for-large-installs",
793794
"how-to-guides/advanced-user-guides/enable-api-audit-log",
794795
"how-to-guides/advanced-user-guides/enable-api-audit-log-in-downstream-clusters",

0 commit comments

Comments
 (0)