[[Qubes|{{q_project_name_long}}]] users who require an additional firewall exception, please press Expand on the right.
Note: [[Non-Qubes-Whonix|{{non_q_project_name_short}}]] users can skip this step.
Open firewall port access for the application between {{project_name_gateway_long}} and {{project_name_workstation_long}}.
{{CodeSelect|code=
sudo iptables -I INPUT 5 -p tcp --dport {{{port}}} -m conntrack --ctstate NEW -j ACCEPT
}}
Unless setting up a web server, change the port number from {{{port}}} to whatever the application requires.
To make the firewall rule persistent, add the rule to the {{Code2|rc.local}} file and make it executable.
Open {{Code2|/rw/config/rc.local}}.
{{CodeSelect|code=
lxsudo mousepad /rw/config/rc.local
}}
Add the following in the {{Code2|rc.local}} file.
{{CodeSelect|code=
#!/bin/sh
sudo iptables -I INPUT 5 -p tcp --dport {{{port}}} -m conntrack --ctstate NEW -j ACCEPT
}}
Make the {{Code2|rc.local}} file executable.
{{CodeSelect|code=
sudo chmod +x /rw/config/rc.local
}}