Skip to content

Commit 9eb8cb5

Browse files
authored
# More minor changes to firewalld.md (#1439)
* minor wording changes
1 parent 60d82f8 commit 9eb8cb5

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

docs/guides/security/firewalld.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ When the introduction of `firewalld` as the default firewall happened (Its intro
1515

1616
This document aims to address the limitations of most `firewalld` references and, to force the author to use `firewalld` to mimic those more granular firewall rules.
1717

18-
From the manual page: "`firewalld` provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. It has support for IPv4, IPv6 firewall settings, Ethernet bridges and a separation of runtime and permanent configuration options. It also supports an interface for services or applications to add firewall rules directly."
18+
From the manual page: "`firewalld` provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. It supports IPv4, IPv6 firewall settings, Ethernet bridges and a separation of runtime and permanent configuration options. It also supports an interface for services or applications to add firewall rules directly."
1919

2020
`firewalld` is actually a front end to the netfilter and nftables Kernel sub-systems in Rocky Linux.
2121

@@ -36,11 +36,11 @@ To really get your head around `firewalld`, you need to understand the use of zo
3636

3737
| zone | example use |
3838
|---------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
39-
| drop | drop incoming connections without reply - allows only outgoing packets. |
39+
| drop | drops incoming connections without reply - allows only outgoing packets. |
4040
| block | rejects incoming connections with an icmp-host-prohibited message for IPv4 and icmp6-adm-prohibited for IPv6 - only network connections initiated within this system are possible. |
4141
| public | for use in public areas - accepts only selected incoming connections. |
42-
| external | accepts only selected incoming connections for use on external networks with masquerading enabled. |
43-
| dmz | for publicly-accessible computers on your demilitarized zone with limited access to your internal network, only selected incoming connections are accepted. |
42+
| external | accepts only selected incoming connections for use on external networks with masquerading enabled. |
43+
| dmz | only selected incoming connections are accepted for publicly accessible computers on your demilitarized zone with limited access to your internal network. |
4444
| work | for computers in work areas - accepts only selected incoming connections. |
4545
| home | for use in home areas - accepts only selected incoming connections |
4646
| internal | for your internal network device access - accepts only selected incoming connections. |
@@ -82,7 +82,7 @@ firewall-cmd --zone=trusted --add-source=192.168.1.122 --permanent
8282
firewall-cmd --zone trusted --add-service=ssh --permanent
8383
```
8484

85-
But what if on this server you also have an intranet that is accessible to only the IP blocks assigned to your organization? Would you now apply the "internal" zone to that rule? The author's preference is to create a zone that deals with the admin users' IPs (those allowed to secure-shell into the server).
85+
But what if, on this server, you also have an intranet that is accessible to only the IP blocks assigned to your organization? Would you now apply the "internal" zone to that rule? The author prefers to create a zone that deals with the admin users' IPs (those allowed to secure-shell into the server).
8686

8787
### Adding zones
8888

@@ -181,7 +181,7 @@ and reload:
181181

182182
!!! Warning
183183

184-
Hold of on that last instruction If you are working on a remote server or VPS! *NEVER remove the `ssh` service from a remote server* unless you have another way to access the shell (see below).
184+
Hold off on that last instruction If you are working on a remote server or VPS! *NEVER remove the `ssh` service from a remote server* unless you have another way to access the shell (see below).
185185

186186
Suppose you lock yourself out of ssh access via the firewall. In that case, you will need to (in the worst-case scenarios) fix your server in person, contact support, or possibly reinstall the OS from your control panel (depending on whether the server is physical or virtual).
187187

0 commit comments

Comments
 (0)