mirror of
https://github.com/mikaela/mikaela.github.io/
synced 2025-08-20 03:47:26 +02:00
Compare commits
3 Commits
b580ac73b7
...
20843b4c57
Author | SHA1 | Date | |
---|---|---|---|
20843b4c57 | |||
49b25ecf13 | |||
1025ad4f9c |
2
Gemfile.lock
generated
2
Gemfile.lock
generated
@ -209,7 +209,7 @@ GEM
|
|||||||
jekyll (>= 3.5, < 5.0)
|
jekyll (>= 3.5, < 5.0)
|
||||||
jekyll-feed (~> 0.9)
|
jekyll-feed (~> 0.9)
|
||||||
jekyll-seo-tag (~> 2.1)
|
jekyll-seo-tag (~> 2.1)
|
||||||
minitest (5.19.0)
|
minitest (5.20.0)
|
||||||
nokogiri (1.15.4-x86_64-linux)
|
nokogiri (1.15.4-x86_64-linux)
|
||||||
racc (~> 1.4)
|
racc (~> 1.4)
|
||||||
octokit (4.25.1)
|
octokit (4.25.1)
|
||||||
|
@ -32,6 +32,8 @@ and overlay networks that I have interacted with recently._
|
|||||||
This post first has list of commands, then explanations that won't be
|
This post first has list of commands, then explanations that won't be
|
||||||
repeated with IPvX ranges.
|
repeated with IPvX ranges.
|
||||||
|
|
||||||
|
Fedora/firewalld? [n/firewalld](/n/firewalld)
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
ufw allow 22/tcp
|
ufw allow 22/tcp
|
||||||
ufw default deny incoming
|
ufw default deny incoming
|
||||||
|
55
n/firewalld.md
Normal file
55
n/firewalld.md
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
---
|
||||||
|
layout: null
|
||||||
|
permalink: /n/firewalld.html
|
||||||
|
redirect_from:
|
||||||
|
- /n/firewall-cmd.html
|
||||||
|
sitemap: false
|
||||||
|
---
|
||||||
|
|
||||||
|
# Quick note on firewalld usage
|
||||||
|
|
||||||
|
This is practically [/ufw](/ufw), but fore Firewalld which Fedora comes with.
|
||||||
|
The blog post also predates me having a /n directory here.
|
||||||
|
|
||||||
|
**_After done, run `sudo firewall-cmd --reload`_**
|
||||||
|
|
||||||
|
<!-- editorconfig-checker-disable -->
|
||||||
|
<!-- prettier-ignore-start -->
|
||||||
|
|
||||||
|
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
|
||||||
|
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
|
||||||
|
|
||||||
|
- [Zones](#zones)
|
||||||
|
- [Services](#services)
|
||||||
|
- [Ports](#ports)
|
||||||
|
|
||||||
|
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
|
||||||
|
|
||||||
|
<!-- prettier-ignore-end -->
|
||||||
|
<!-- editorconfig-checker-enable -->
|
||||||
|
|
||||||
|
## Zones
|
||||||
|
|
||||||
|
firewalld zones are privilege of NetworkManager users, this tends to be
|
||||||
|
a systemd-networkd household. Then again I don't believe in absolutely trusted
|
||||||
|
zones.
|
||||||
|
|
||||||
|
Zone would be specified by `--zone=home` in the commands. The other zone I
|
||||||
|
could imagine using is `public`.
|
||||||
|
|
||||||
|
## Services
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo firewall-cmd --add-service=mosh --permanent
|
||||||
|
```
|
||||||
|
|
||||||
|
## Ports
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# TODO: Don't do this, this is a ppor example.
|
||||||
|
# firewalld surely recognises 631 as a service of some name,
|
||||||
|
# and as noted before, --zone won't work on my systems.
|
||||||
|
sudo firewall-cmd --zone=home --permanent --add-port=631/tcp
|
||||||
|
```
|
||||||
|
|
||||||
|
- 631/tcp is used by cups.
|
Loading…
x
Reference in New Issue
Block a user