<div class="toccolours mw-collapsible mw-collapsed">
[[Qubes|{{q_project_name_long}}]] users who require an additional firewall exception, please press Expand on the right.<br />
Note: [[Non-Qubes-Whonix|{{non_q_project_name_short}}]] users can skip this step.
<div class="mw-collapsible-content">
Open firewall port access for the application between {{project_name_gateway_long}} and {{project_name_workstation_long}}.

{{CodeSelect|code=
sudo iptables -I INPUT 5 -p tcp --dport {{{port}}} -m conntrack --ctstate NEW -j ACCEPT
}}

Unless setting up a web server, change the port number from {{{port}}} to whatever the application requires.

To make the firewall rule persistent, add the rule to the {{Code2|rc.local}} file and make it executable.

Open {{Code2|/rw/config/rc.local}}.

{{CodeSelect|code=
lxsudo mousepad /rw/config/rc.local
}}

Add the following in the {{Code2|rc.local}} file.

{{CodeSelect|code=
#!/bin/sh
sudo iptables -I INPUT 5 -p tcp --dport {{{port}}} -m conntrack --ctstate NEW -j ACCEPT
}}

Make the {{Code2|rc.local}} file executable.

{{CodeSelect|code=
sudo chmod +x /rw/config/rc.local
}}
</div>
</div>