mirror of
https://github.com/mikaela/mikaela.github.io/
synced 2025-08-20 03:47:26 +02:00
Compare commits
No commits in common. "20843b4c570377dd0bd5c92d4cb4613787bac8b6" and "b580ac73b70ccbd402de59518681b948e20e1405" have entirely different histories.
20843b4c57
...
b580ac73b7
2
Gemfile.lock
generated
2
Gemfile.lock
generated
@ -209,7 +209,7 @@ GEM
|
|||||||
jekyll (>= 3.5, < 5.0)
|
jekyll (>= 3.5, < 5.0)
|
||||||
jekyll-feed (~> 0.9)
|
jekyll-feed (~> 0.9)
|
||||||
jekyll-seo-tag (~> 2.1)
|
jekyll-seo-tag (~> 2.1)
|
||||||
minitest (5.20.0)
|
minitest (5.19.0)
|
||||||
nokogiri (1.15.4-x86_64-linux)
|
nokogiri (1.15.4-x86_64-linux)
|
||||||
racc (~> 1.4)
|
racc (~> 1.4)
|
||||||
octokit (4.25.1)
|
octokit (4.25.1)
|
||||||
|
@ -32,8 +32,6 @@ and overlay networks that I have interacted with recently._
|
|||||||
This post first has list of commands, then explanations that won't be
|
This post first has list of commands, then explanations that won't be
|
||||||
repeated with IPvX ranges.
|
repeated with IPvX ranges.
|
||||||
|
|
||||||
Fedora/firewalld? [n/firewalld](/n/firewalld)
|
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
ufw allow 22/tcp
|
ufw allow 22/tcp
|
||||||
ufw default deny incoming
|
ufw default deny incoming
|
||||||
|
@ -1,55 +0,0 @@
|
|||||||
---
|
|
||||||
layout: null
|
|
||||||
permalink: /n/firewalld.html
|
|
||||||
redirect_from:
|
|
||||||
- /n/firewall-cmd.html
|
|
||||||
sitemap: false
|
|
||||||
---
|
|
||||||
|
|
||||||
# Quick note on firewalld usage
|
|
||||||
|
|
||||||
This is practically [/ufw](/ufw), but fore Firewalld which Fedora comes with.
|
|
||||||
The blog post also predates me having a /n directory here.
|
|
||||||
|
|
||||||
**_After done, run `sudo firewall-cmd --reload`_**
|
|
||||||
|
|
||||||
<!-- editorconfig-checker-disable -->
|
|
||||||
<!-- prettier-ignore-start -->
|
|
||||||
|
|
||||||
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
|
|
||||||
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
|
|
||||||
|
|
||||||
- [Zones](#zones)
|
|
||||||
- [Services](#services)
|
|
||||||
- [Ports](#ports)
|
|
||||||
|
|
||||||
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
|
|
||||||
|
|
||||||
<!-- prettier-ignore-end -->
|
|
||||||
<!-- editorconfig-checker-enable -->
|
|
||||||
|
|
||||||
## Zones
|
|
||||||
|
|
||||||
firewalld zones are privilege of NetworkManager users, this tends to be
|
|
||||||
a systemd-networkd household. Then again I don't believe in absolutely trusted
|
|
||||||
zones.
|
|
||||||
|
|
||||||
Zone would be specified by `--zone=home` in the commands. The other zone I
|
|
||||||
could imagine using is `public`.
|
|
||||||
|
|
||||||
## Services
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo firewall-cmd --add-service=mosh --permanent
|
|
||||||
```
|
|
||||||
|
|
||||||
## Ports
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# TODO: Don't do this, this is a ppor example.
|
|
||||||
# firewalld surely recognises 631 as a service of some name,
|
|
||||||
# and as noted before, --zone won't work on my systems.
|
|
||||||
sudo firewall-cmd --zone=home --permanent --add-port=631/tcp
|
|
||||||
```
|
|
||||||
|
|
||||||
- 631/tcp is used by cups.
|
|
Loading…
x
Reference in New Issue
Block a user