mirror of
https://gitea.com/mcereda/oam.git
synced 2026-02-09 05:44:23 +00:00
chore(kb/firewalld): improve article
This commit is contained in:
1
.vscode/settings.json
vendored
1
.vscode/settings.json
vendored
@@ -163,6 +163,7 @@
|
|||||||
"keepass",
|
"keepass",
|
||||||
"keybase",
|
"keybase",
|
||||||
"keygrip",
|
"keygrip",
|
||||||
|
"killall",
|
||||||
"kivi",
|
"kivi",
|
||||||
"knockd",
|
"knockd",
|
||||||
"kubeconfig",
|
"kubeconfig",
|
||||||
|
|||||||
@@ -38,6 +38,14 @@ sudo firewall-cmd --list-services
|
|||||||
sudo firewall-cmd --list-services --zone='public'
|
sudo firewall-cmd --list-services --zone='public'
|
||||||
sudo firewall-cmd --list-services --permanent
|
sudo firewall-cmd --list-services --permanent
|
||||||
|
|
||||||
|
# Create service definitions.
|
||||||
|
sudo firewall-cmd --permanent --new-service 'gitea' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --set-description \
|
||||||
|
'Painless self-hosted all-in-one software development service similar to GitHub, Bitbucket and GitLab.' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --set-short 'Private, fast and reliable DevOps platform' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --add-port '2222/tcp' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --add-port '3000/tcp'
|
||||||
|
|
||||||
# Allow services.
|
# Allow services.
|
||||||
sudo firewall-cmd --add-service='http'
|
sudo firewall-cmd --add-service='http'
|
||||||
sudo firewall-cmd --add-service='ssh' --zone='public'
|
sudo firewall-cmd --add-service='ssh' --zone='public'
|
||||||
@@ -71,12 +79,20 @@ sudo firewall-cmd --permanent --remove-service='ssh'
|
|||||||
# Create a new zone.
|
# Create a new zone.
|
||||||
sudo firewall-cmd --new-zone='publicweb' --permanent
|
sudo firewall-cmd --new-zone='publicweb' --permanent
|
||||||
|
|
||||||
# Make changes permanent.
|
# Make temporary changes permanent.
|
||||||
sudo firewall-cmd --runtime-to-permanent
|
sudo firewall-cmd --runtime-to-permanent
|
||||||
|
|
||||||
# Reload the firewall.
|
# Reload firewall rules from the permanent configuration.
|
||||||
|
# Keep the state's information.
|
||||||
sudo firewall-cmd --reload
|
sudo firewall-cmd --reload
|
||||||
|
|
||||||
|
# Reload the firewall completely.
|
||||||
|
# Includes netfilter kernel modules.
|
||||||
|
# Loses state information, likely terminating all active connections.
|
||||||
|
# Should only be used when issues arise.
|
||||||
|
sudo firewall-cmd --complete-reload
|
||||||
|
sudo killall -HUP 'firewalld'
|
||||||
|
|
||||||
# Use the offline version.
|
# Use the offline version.
|
||||||
# '--permanent' does not work here.
|
# '--permanent' does not work here.
|
||||||
sudo firewall-offline-cmd --add-port='22/tcp' && sudo firewall-cmd --reload
|
sudo firewall-offline-cmd --add-port='22/tcp' && sudo firewall-cmd --reload
|
||||||
@@ -87,24 +103,22 @@ sudo firewall-offline-cmd --add-port='22/tcp' && sudo firewall-cmd --reload
|
|||||||
- [Website]
|
- [Website]
|
||||||
- [Documentation]
|
- [Documentation]
|
||||||
|
|
||||||
## Sources
|
### Sources
|
||||||
|
|
||||||
All the references in the [further readings] section, plus the following:
|
|
||||||
|
|
||||||
- [Open TCP Port on openSUSE Firewall]
|
- [Open TCP Port on openSUSE Firewall]
|
||||||
- [How To Set Up a Firewall Using firewalld on CentOS 8]
|
- [How To Set Up a Firewall Using firewalld on CentOS 8]
|
||||||
|
- [Add a Service]
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
References
|
References
|
||||||
-->
|
-->
|
||||||
|
|
||||||
|
<!-- In-article sections -->
|
||||||
<!-- Upstream -->
|
<!-- Upstream -->
|
||||||
|
[add a service]: https://firewalld.org/documentation/howto/add-a-service.html
|
||||||
[documentation]: https://firewalld.org/documentation/
|
[documentation]: https://firewalld.org/documentation/
|
||||||
[website]: https://firewalld.org/
|
[website]: https://firewalld.org/
|
||||||
|
|
||||||
<!-- In-article sections -->
|
|
||||||
[further readings]: #further-readings
|
|
||||||
|
|
||||||
<!-- Others -->
|
<!-- Others -->
|
||||||
[how to set up a firewall using firewalld on centos 8]: https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-using-firewalld-on-centos-8
|
[how to set up a firewall using firewalld on centos 8]: https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-using-firewalld-on-centos-8
|
||||||
[open tcp port on opensuse firewall]: https://vazhavandan.blogspot.com/2020/08/open-tcp-port-on-opensuse-firewall.html
|
[open tcp port on opensuse firewall]: https://vazhavandan.blogspot.com/2020/08/open-tcp-port-on-opensuse-firewall.html
|
||||||
|
|||||||
33
snippets/firewalld.sh
Normal file
33
snippets/firewalld.sh
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
|
||||||
|
# Open ports.
|
||||||
|
sudo firewall-cmd --add-port='3000/tcp' --zone='public' --permanent
|
||||||
|
sudo firewall-cmd --add-port='2222/tcp' --zone='public'
|
||||||
|
|
||||||
|
|
||||||
|
# List pre-loaded, available services.
|
||||||
|
sudo firewall-cmd --get-services
|
||||||
|
|
||||||
|
# List allowed services.
|
||||||
|
sudo firewall-cmd --list-services
|
||||||
|
|
||||||
|
# Add services.
|
||||||
|
sudo firewall-cmd --permanent --new-service 'gitea' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --set-description \
|
||||||
|
'Painless self-hosted all-in-one software development service similar to GitHub, Bitbucket and GitLab.' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --set-short 'Private, fast and reliable DevOps platform' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --add-port '2222/tcp' \
|
||||||
|
&& sudo firewall-cmd --permanent --service 'gitea' --add-port '3000/tcp'
|
||||||
|
|
||||||
|
# Allow services.
|
||||||
|
sudo firewall-cmd --permanent --add-service 'gitea'
|
||||||
|
|
||||||
|
|
||||||
|
# Reload.
|
||||||
|
sudo firewall-cmd --reload
|
||||||
|
sudo firewall-cmd --complete-reload
|
||||||
|
sudo killall -HUP 'firewalld'
|
||||||
|
|
||||||
|
|
||||||
|
# List allowed flows.
|
||||||
|
sudo firewall-cmd --list-all
|
||||||
Reference in New Issue
Block a user