Quote
Just a couple of things:
The rule looks right. Your profile could be odd... Maybe ufw status verbose might be more revealing than ufw status numbered.
AFAIK, ufw is really just a management front-end for iptables. I'm pretty sure systemctl stop ufw won't disable the active rule-set, nor will systemctl disable ufw until after a reboot. It's possible that there's some outbound filtering happening so maybe try again after issuing ufw disable on both machines...
[\quote]
Yes systemctl disable ufw followed by systemctl stop ufw works.Quote
The rule does look correct. You may want to add logging to see what happens to incoming connections:Code Selectufw allow in log proto tcp from 192.168.0.212 to any port ldaps
[\quote]
Cheers. Done!Quote
IIRC, there is an OpenLDAP profile (which you can confirm by issuing ufw app list), so you could also use:Code Selectufw allow in log proto tcp from 192.168.0.212 to any app "OpenLDAP LDAPS"
[\quote]
Will look into that.Quote
I don't think I have ever commissioned an LDAP server with port 389/tcp closed. Perhaps there is a dependency and you need both open (I think this unlikely but possible)...
I think port 389 is unsecured unless used with tls and is mostly used for MS AD but it seems to be enable here on the mail/ldaps server anyway. I think perhaps it's there for outlook/AD compatibility.QuoteDo you mean entry in the host file (like 192.168.0.212 cloud3) on ldaps host and vice versa?
Finally, in relation to your concerns regarding name resolution, you could use an entry at /etc/hosts while troubleshooting. Perhaps reboot afterwards to be sure no lingering resolver issues exist.