You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/guides/security/firewalld.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ When the introduction of `firewalld` as the default firewall happened (Its intro
15
15
16
16
This document aims to address the limitations of most `firewalld` references and, to force the author to use `firewalld` to mimic those more granular firewall rules.
17
17
18
-
From the manual page: "`firewalld` provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. It has support for IPv4, IPv6 firewall settings, Ethernet bridges and a separation of runtime and permanent configuration options. It also supports an interface for services or applications to add firewall rules directly."
18
+
From the manual page: "`firewalld` provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. It supports IPv4, IPv6 firewall settings, Ethernet bridges and a separation of runtime and permanent configuration options. It also supports an interface for services or applications to add firewall rules directly."
19
19
20
20
`firewalld` is actually a front end to the netfilter and nftables Kernel sub-systems in Rocky Linux.
21
21
@@ -36,11 +36,11 @@ To really get your head around `firewalld`, you need to understand the use of zo
| drop |drop incoming connections without reply - allows only outgoing packets.|
39
+
| drop |drops incoming connections without reply - allows only outgoing packets. |
40
40
| block | rejects incoming connections with an icmp-host-prohibited message for IPv4 and icmp6-adm-prohibited for IPv6 - only network connections initiated within this system are possible. |
41
41
| public | for use in public areas - accepts only selected incoming connections. |
42
-
| external | accepts only selected incoming connections for use on external networks with masquerading enabled. |
43
-
| dmz | for publicly-accessible computers on your demilitarized zone with limited access to your internal network, only selected incoming connections are accepted.|
42
+
| external | accepts only selected incoming connections for use on external networks with masquerading enabled. |
43
+
| dmz |only selected incoming connections are accepted for publiclyaccessible computers on your demilitarized zone with limited access to your internal network. |
44
44
| work | for computers in work areas - accepts only selected incoming connections. |
45
45
| home | for use in home areas - accepts only selected incoming connections |
46
46
| internal | for your internal network device access - accepts only selected incoming connections. |
But what if on this server you also have an intranet that is accessible to only the IP blocks assigned to your organization? Would you now apply the "internal" zone to that rule? The author's preference is to create a zone that deals with the admin users' IPs (those allowed to secure-shell into the server).
85
+
But what if, on this server, you also have an intranet that is accessible to only the IP blocks assigned to your organization? Would you now apply the "internal" zone to that rule? The author prefers to create a zone that deals with the admin users' IPs (those allowed to secure-shell into the server).
86
86
87
87
### Adding zones
88
88
@@ -181,7 +181,7 @@ and reload:
181
181
182
182
!!! Warning
183
183
184
-
Hold of on that last instruction If you are working on a remote server or VPS! *NEVER remove the `ssh` service from a remote server* unless you have another way to access the shell (see below).
184
+
Hold off on that last instruction If you are working on a remote server or VPS! *NEVER remove the `ssh` service from a remote server* unless you have another way to access the shell (see below).
185
185
186
186
Suppose you lock yourself out of ssh access via the firewall. In that case, you will need to (in the worst-case scenarios) fix your server in person, contact support, or possibly reinstall the OS from your control panel (depending on whether the server is physical or virtual).
0 commit comments