2023-09-09 09:50:06 +02:00
---
2024-05-18 18:58:57 +02:00
layout: mini
2023-09-09 09:50:06 +02:00
permalink: /n/firewalld.html
redirect_from:
- /n/firewall-cmd.html
sitemap: false
---
# Quick note on firewalld usage
This is practically [/ufw ](/ufw ), but fore Firewalld which Fedora comes with.
The blog post also predates me having a /n directory here.
**_After done, run `sudo firewall-cmd --reload` _**
<!-- editorconfig - checker - disable -->
<!-- prettier - ignore - start -->
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
<!-- DON'T EDIT THIS SECTION, INSTEAD RE - RUN doctoc TO UPDATE -->
2024-05-29 10:24:15 +02:00
_Automaattinen sisällysluettelo - Automatically generated Table of Contents_
2023-09-09 09:50:06 +02:00
- [Zones ](#zones )
2024-04-17 10:34:08 +02:00
- [Protocols ](#protocols )
2023-09-09 09:50:06 +02:00
- [Services ](#services )
- [Ports ](#ports )
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
<!-- prettier - ignore - end -->
<!-- editorconfig - checker - enable -->
## Zones
firewalld zones are privilege of NetworkManager users, this tends to be
a systemd-networkd household. Then again I don't believe in absolutely trusted
zones.
Zone would be specified by `--zone=home` in the commands. The other zone I
could imagine using is `public` .
2024-04-17 10:34:08 +02:00
## Protocols
```bash
sudo firewall-cmd --add-protocol=ipv6-icmp --permanent
```
- Tells computers when things go wrong with IPv6 network. See also [Neil Alexander: Understanding ICMP and why you shouldn't just block it outright ](https://neilalexander.dev/2017/04/16/understanding-icmp ).
- _Motivation for being here is [20/20 in IPv6-test.com ](https://ipv6-test.com )._
2023-09-09 09:50:06 +02:00
## Services
```bash
2023-09-09 10:53:01 +02:00
sudo firewall-cmd --add-service=ssh --permanent
2023-09-09 09:50:06 +02:00
sudo firewall-cmd --add-service=mosh --permanent
2023-09-09 10:53:01 +02:00
sudo firewall-cmd --add-service=ntp --permanent
sudo firewall-cmd --add-service=syncthing --permanent
2024-04-12 13:17:21 +02:00
sudo firewall-cmd --add-service=mdns --permanent
2023-09-09 09:50:06 +02:00
```
2023-09-09 10:53:01 +02:00
- I trust Chrony (ntp) to not allow it to be used from outside of LAN
as `firewalld` is apparently not designed with limiting source
addresses in mind.
- `syncthing` is the client, not to be confused with `syncthing-gui`
or `syncthing-relay` .
2023-09-09 09:50:06 +02:00
## Ports
```bash
2023-09-09 10:53:01 +02:00
sudo firewall-cmd --permanent --add-port=9001/udp
sudo firewall-cmd --permanent --add-port=6771/udp
2023-09-09 09:50:06 +02:00
```
2023-09-09 10:53:01 +02:00
- `9001/udp` is Yggdrasil automatic peering, although link-local and
unlikely to be recognised by predefined rules.
- `6771/udp` is [Bittorrent Local Peer Discovery ](http://bittorrent.org/beps/bep_0014.html )