Compare commits

..

3 Commits

Author SHA1 Message Date
20843b4c57
blog/ufw: note firewalld note 2023-09-09 10:51:00 +03:00
49b25ecf13
n/firewalld: initial commit
Resolves: #276
2023-09-09 10:50:06 +03:00
1025ad4f9c
bundle update 2023-09-09 10:38:49 +03:00
3 changed files with 58 additions and 1 deletions

2
Gemfile.lock generated
View File

@ -209,7 +209,7 @@ GEM
jekyll (>= 3.5, < 5.0) jekyll (>= 3.5, < 5.0)
jekyll-feed (~> 0.9) jekyll-feed (~> 0.9)
jekyll-seo-tag (~> 2.1) jekyll-seo-tag (~> 2.1)
minitest (5.19.0) minitest (5.20.0)
nokogiri (1.15.4-x86_64-linux) nokogiri (1.15.4-x86_64-linux)
racc (~> 1.4) racc (~> 1.4)
octokit (4.25.1) octokit (4.25.1)

View File

@ -32,6 +32,8 @@ and overlay networks that I have interacted with recently._
This post first has list of commands, then explanations that won't be This post first has list of commands, then explanations that won't be
repeated with IPvX ranges. repeated with IPvX ranges.
Fedora/firewalld? [n/firewalld](/n/firewalld)
```bash ```bash
ufw allow 22/tcp ufw allow 22/tcp
ufw default deny incoming ufw default deny incoming

55
n/firewalld.md Normal file
View File

@ -0,0 +1,55 @@
---
layout: null
permalink: /n/firewalld.html
redirect_from:
- /n/firewall-cmd.html
sitemap: false
---
# Quick note on firewalld usage
This is practically [/ufw](/ufw), but fore Firewalld which Fedora comes with.
The blog post also predates me having a /n directory here.
**_After done, run `sudo firewall-cmd --reload`_**
<!-- editorconfig-checker-disable -->
<!-- prettier-ignore-start -->
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
- [Zones](#zones)
- [Services](#services)
- [Ports](#ports)
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
<!-- prettier-ignore-end -->
<!-- editorconfig-checker-enable -->
## Zones
firewalld zones are privilege of NetworkManager users, this tends to be
a systemd-networkd household. Then again I don't believe in absolutely trusted
zones.
Zone would be specified by `--zone=home` in the commands. The other zone I
could imagine using is `public`.
## Services
```bash
sudo firewall-cmd --add-service=mosh --permanent
```
## Ports
```bash
# TODO: Don't do this, this is a ppor example.
# firewalld surely recognises 631 as a service of some name,
# and as noted before, --zone won't work on my systems.
sudo firewall-cmd --zone=home --permanent --add-port=631/tcp
```
- 631/tcp is used by cups.