summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--doc/admin-guide/en-US/markdown/admin_settingup_clients.md16
1 files changed, 10 insertions, 6 deletions
diff --git a/doc/admin-guide/en-US/markdown/admin_settingup_clients.md b/doc/admin-guide/en-US/markdown/admin_settingup_clients.md
index c271eac67da..30ec4415513 100644
--- a/doc/admin-guide/en-US/markdown/admin_settingup_clients.md
+++ b/doc/admin-guide/en-US/markdown/admin_settingup_clients.md
@@ -49,13 +49,15 @@ To install Gluster Native Client on RPM distribution-based systems
2. Ensure that TCP and UDP ports 24007 and 24008 are open on all
Gluster servers. Apart from these ports, you need to open one port
- for each brick starting from port 24009. For example: if you have
- five bricks, you need to have ports 24009 to 24013 open.
+ for each brick starting from port 49152 (instead of 24009 onwards as
+ with previous releases). The brick ports assignment scheme is now
+ compliant with IANA guidelines. For example: if you have
+ five bricks, you need to have ports 49152 to 49156 open.
You can use the following chains with iptables:
`$ sudo iptables -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 24007:24008 -j ACCEPT `
- `$ sudo iptables -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 24009:24014 -j ACCEPT`
+ `$ sudo iptables -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 49152:49156 -j ACCEPT`
> **Note**
>
@@ -121,13 +123,15 @@ To install Gluster Native Client on Debian-based distributions
6. Ensure that TCP and UDP ports 24007 and 24008 are open on all
Gluster servers. Apart from these ports, you need to open one port
- for each brick starting from port 24009. For example: if you have
- five bricks, you need to have ports 24009 to 24013 open.
+ for each brick starting from port 49152 (instead of 24009 onwards as
+ with previous releases). The brick ports assignment scheme is now
+ compliant with IANA guidelines. For example: if you have
+ five bricks, you need to have ports 49152 to 49156 open.
You can use the following chains with iptables:
`$ sudo iptables -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 24007:24008 -j ACCEPT `
- `$ sudo iptables -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 24009:24014 -j ACCEPT`
+ `$ sudo iptables -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 49152:49156 -j ACCEPT`
> **Note**
>