2015-01-12 15:45:34 +00:00
|
|
|
# firewall-cmd
|
|
|
|
|
2016-01-07 17:31:27 +00:00
|
|
|
> The firewalld command line client.
|
2015-01-12 15:45:34 +00:00
|
|
|
|
2016-01-07 17:31:27 +00:00
|
|
|
- View the available firewall zones:
|
2015-01-12 15:45:34 +00:00
|
|
|
|
|
|
|
`firewall-cmd --get-active-zones`
|
|
|
|
|
2016-01-07 17:31:27 +00:00
|
|
|
- View the rules which are currently applied:
|
2015-01-12 15:45:34 +00:00
|
|
|
|
|
|
|
`firewall-cmd --list-all`
|
|
|
|
|
2020-03-03 17:21:21 +00:00
|
|
|
- Permanently move the interface into the block zone, effectively blocking all communication:
|
|
|
|
|
|
|
|
`firewall-cmd --permanent --zone={{block}} --change-interface={{enp1s0}}`
|
|
|
|
|
2016-01-07 17:31:27 +00:00
|
|
|
- Permanently open the port for a service in the specified zone (like port `443` when in the `public` zone):
|
2015-01-12 15:45:34 +00:00
|
|
|
|
|
|
|
`firewall-cmd --permanent --zone={{public}} --add-service={{https}}`
|
|
|
|
|
2016-01-07 17:31:27 +00:00
|
|
|
- Permanently close the port for a service in the specified zone (like port `80` when in the `public` zone):
|
2015-01-12 15:45:34 +00:00
|
|
|
|
|
|
|
`firewall-cmd --permanent --zone={{public}} --remove-service={{http}}`
|
|
|
|
|
2020-03-03 17:21:21 +00:00
|
|
|
- Permanently open two arbitrary ports in the specified zone:
|
|
|
|
|
|
|
|
`firewall-cmd --permanent --zone={{public}} --add-port={{25565/tcp}} --add-port={{19132/udp}}`
|
|
|
|
|
2016-01-07 17:31:27 +00:00
|
|
|
- Reload firewalld to force rule changes to take effect:
|
2015-01-12 15:45:34 +00:00
|
|
|
|
|
|
|
`firewall-cmd --reload`
|