From d8030245492b27daf9f35bf549eb667f15aa42c5 Mon Sep 17 00:00:00 2001 From: Quentin McGaw Date: Wed, 30 Dec 2020 22:43:30 -0500 Subject: [PATCH] Remove external firewall document --- Contributing/Development.md | 1 - Setup/External firewall.md | 40 ------------------------------------- 2 files changed, 41 deletions(-) delete mode 100644 Setup/External firewall.md diff --git a/Contributing/Development.md b/Contributing/Development.md index 070e93c..30f6807 100644 --- a/Contributing/Development.md +++ b/Contributing/Development.md @@ -44,4 +44,3 @@ The Go code is in the Go file [cmd/main.go](https://github.com/qdm12/gluetun/blo See the [Contributing document](https://github.com/qdm12/gluetun/blob/master/.github/CONTRIBUTING.md) for more information on how to contribute to this repository. As always, feel free to reach out to me if you have any question. - diff --git a/Setup/External firewall.md b/Setup/External firewall.md deleted file mode 100644 index f01af35..0000000 --- a/Setup/External firewall.md +++ /dev/null @@ -1,40 +0,0 @@ -If you have a strict firewall setup (host level or router level), you will need to let some ports through for this container to work. - -## VPN connections - -You need the following to allow communicating with the VPN servers - -### Private Internet Access - -- If `PIA_ENCRYPTION=strong` and `PROTOCOL=udp`: allow outbound UDP 1197 to the corresponding VPN server IPs -- If `PIA_ENCRYPTION=normal` and `PROTOCOL=udp`: allow outbound UDP 1198 to the corresponding VPN server IPs -- If `PIA_ENCRYPTION=strong` and `PROTOCOL=tcp`: allow outbound TCP 501 to the corresponding VPN server IPs -- If `PIA_ENCRYPTION=normal` and `PROTOCOL=tcp`: allow outbound TCP 502 to the corresponding VPN server IPs - -### Mullvad - -- If `PORT=`, please refer to the mapping of Mullvad servers in [these source code lines](../internal/constants/mullvad.go#L64-L667) to find the corresponding UDP port number and IP address(es) of your choice -- If `PORT=53`, allow outbound UDP 53 to the corresponding VPN server IPs, which you can fine in [the mapping of Mullvad servers](../internal/constants/mullvad.go#L64-L667) -- If `PORT=80`, allow outbound TCP 80 to the corresponding VPN server IPs, which you can fine in [the mapping of Mullvad servers](../internal/constants/mullvad.go#L64-L667) -- If `PORT=443`, allow outbound TCP 443 to the corresponding VPN server IPs, which you can fine in [the mapping of Mullvad servers](../internal/constants/mullvad.go#L64-L667) - -### Windscribe - -- If `PROTOCOL=udp`: allow outbound UDP 443 to the corresponding VPN server IPs -- If `PROTOCOL=tcp`: allow outbound TCP 1194 to the corresponding VPN server IPs - -### Surfshark - -- If `PROTOCOL=udp`: allow outbound UDP 1194 to the corresponding VPN server IPs -- If `PROTOCOL=tcp`: allow outbound TCP 1443 to the corresponding VPN server IPs - -### Cyberghost - -- If `PROTOCOL=udp`: allow outbound UDP 1443 to the corresponding VPN server IPs -- If `PROTOCOL=tcp`: allow outbound TCP 1443 to the corresponding VPN server IPs - -## Inbound connections - -- If `SHADOWSOCKS=on`, allow inbound TCP 8388 and UDP 8388 from your LAN -- If `TINYPROXY=on`, allow inbound TCP 8888 from your LAN -- If you want access to the built-in HTTP control server, allow inbound TCP 8000 from your LAN