[[Qubes|{{q_project_name_long}}]] users who require an additional firewall exception, please press Expand on the right.
Note: [[Non-Qubes-Whonix|{{non_q_project_name_short}}]] users can skip this step.
Open firewall port access for the application between {{project_name_gateway_long}} and {{project_name_workstation_long}}. {{CodeSelect|code= sudo iptables -I INPUT 5 -p tcp --dport {{{port}}} -m conntrack --ctstate NEW -j ACCEPT }} Unless setting up a web server, change the port number from {{{port}}} to whatever the application requires. To make the firewall rule persistent, add the rule to the {{Code2|rc.local}} file and make it executable. Open {{Code2|/rw/config/rc.local}}. {{CodeSelect|code= lxsudo mousepad /rw/config/rc.local }} Add the following in the {{Code2|rc.local}} file. {{CodeSelect|code= #!/bin/sh sudo iptables -I INPUT 5 -p tcp --dport {{{port}}} -m conntrack --ctstate NEW -j ACCEPT }} Make the {{Code2|rc.local}} file executable. {{CodeSelect|code= sudo chmod +x /rw/config/rc.local }}