Files
gluetun/doc/firewall.md
Quentin McGaw f4cd1896c9 Go HTTP control server with restart openvpn route
- Fix #147
- Dockerfile updated
- Documentation updated
- Using contexts to restart openvpn
- Code foundation for more http routes
2020-04-30 23:41:57 +00:00

2.1 KiB

Firewall

If you have a strict firewall setup (host level or router level), you might want to setup the following.

Start only

The following is required when the container starts only:

  • Allow outbound TCP 443 to github.com
  • If DOT=on, allow outbound TCP 853 to allow Unbound to resolve github.com and the PIA subdomain name if you use PIA.
  • If DOT=off and VPNSP=pia, allow outbound UDP 53 to your DNS provider to resolve the PIA subdomain name.

VPN connections

You need the following to allow communicating with the VPN servers

Private Internet Access

  • If PIA_ENCRYPTION=strong and PROTOCOL=udp: allow outbound UDP 1197 to the corresponding VPN server IPs
  • If PIA_ENCRYPTION=normal and PROTOCOL=udp: allow outbound UDP 1198 to the corresponding VPN server IPs
  • If PIA_ENCRYPTION=strong and PROTOCOL=tcp: allow outbound TCP 501 to the corresponding VPN server IPs
  • If PIA_ENCRYPTION=normal and PROTOCOL=tcp: allow outbound TCP 502 to the corresponding VPN server IPs

Mullvad

Windscribe

  • If PROTOCOL=udp: allow outbound UDP 443 to the corresponding VPN server IPs
  • If PROTOCOL=tcp: allow outbound TCP 1194 to the corresponding VPN server IPs

Inbound connections

  • If SHADOWSOCKS=on, allow inbound TCP 8388 and UDP 8388 from your LAN
  • If TINYPROXY=on, allow inbound TCP 8888 from your LAN
  • If you want access to the built-in HTTP control server, allow inbound TCP 8000 from your LAN