

If your instance comprises multiple nodes, for example if high availability or geo-replication are configured, SSH into the primary node. SSH into your GitHub Enterprise Server instance. We do not recommend customizing UFW as it can complicate some troubleshooting issues. For more information on the UFW rule set, see the UFW README. The UFW firewall also opens several other ports that are required for GitHub Enterprise Server to operate properly. For more information, see " Network ports." Stateful tracking is enabled for any new connections these are typically network packets with the SYN bit set. Every non-required port is automatically configured as deny, and the default outgoing policy is configured as allow.

GitHub Enterprise Server automatically updates the firewall allowlist of allowed services with each release.Īfter you install GitHub Enterprise Server, all required network ports are automatically opened to accept connections.

For more information see " UFW" in the Ubuntu documentation. GitHub Enterprise Server uses Ubuntu's Uncomplicated Firewall (UFW) on the virtual appliance. About your GitHub Enterprise Server instance's firewall
