mirror of
https://github.com/mikaela/mikaela.github.io/
synced 2025-08-20 03:47:26 +02:00
Compare commits
No commits in common. "20843b4c570377dd0bd5c92d4cb4613787bac8b6" and "b580ac73b70ccbd402de59518681b948e20e1405" have entirely different histories.
20843b4c57
...
b580ac73b7
2
Gemfile.lock
generated
2
Gemfile.lock
generated
@ -209,7 +209,7 @@ GEM
|
||||
jekyll (>= 3.5, < 5.0)
|
||||
jekyll-feed (~> 0.9)
|
||||
jekyll-seo-tag (~> 2.1)
|
||||
minitest (5.20.0)
|
||||
minitest (5.19.0)
|
||||
nokogiri (1.15.4-x86_64-linux)
|
||||
racc (~> 1.4)
|
||||
octokit (4.25.1)
|
||||
|
@ -32,8 +32,6 @@ and overlay networks that I have interacted with recently._
|
||||
This post first has list of commands, then explanations that won't be
|
||||
repeated with IPvX ranges.
|
||||
|
||||
Fedora/firewalld? [n/firewalld](/n/firewalld)
|
||||
|
||||
```bash
|
||||
ufw allow 22/tcp
|
||||
ufw default deny incoming
|
||||
|
@ -1,55 +0,0 @@
|
||||
---
|
||||
layout: null
|
||||
permalink: /n/firewalld.html
|
||||
redirect_from:
|
||||
- /n/firewall-cmd.html
|
||||
sitemap: false
|
||||
---
|
||||
|
||||
# Quick note on firewalld usage
|
||||
|
||||
This is practically [/ufw](/ufw), but fore Firewalld which Fedora comes with.
|
||||
The blog post also predates me having a /n directory here.
|
||||
|
||||
**_After done, run `sudo firewall-cmd --reload`_**
|
||||
|
||||
<!-- editorconfig-checker-disable -->
|
||||
<!-- prettier-ignore-start -->
|
||||
|
||||
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
|
||||
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
|
||||
|
||||
- [Zones](#zones)
|
||||
- [Services](#services)
|
||||
- [Ports](#ports)
|
||||
|
||||
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
|
||||
|
||||
<!-- prettier-ignore-end -->
|
||||
<!-- editorconfig-checker-enable -->
|
||||
|
||||
## Zones
|
||||
|
||||
firewalld zones are privilege of NetworkManager users, this tends to be
|
||||
a systemd-networkd household. Then again I don't believe in absolutely trusted
|
||||
zones.
|
||||
|
||||
Zone would be specified by `--zone=home` in the commands. The other zone I
|
||||
could imagine using is `public`.
|
||||
|
||||
## Services
|
||||
|
||||
```bash
|
||||
sudo firewall-cmd --add-service=mosh --permanent
|
||||
```
|
||||
|
||||
## Ports
|
||||
|
||||
```bash
|
||||
# TODO: Don't do this, this is a ppor example.
|
||||
# firewalld surely recognises 631 as a service of some name,
|
||||
# and as noted before, --zone won't work on my systems.
|
||||
sudo firewall-cmd --zone=home --permanent --add-port=631/tcp
|
||||
```
|
||||
|
||||
- 631/tcp is used by cups.
|
Loading…
x
Reference in New Issue
Block a user