2022-12-13 14:17:14
浏览数 (1)
centos防火墙规则设置
开启防火墙设置并设置开机自启动模式
代码语言:javascript
复制systemctl start firewalld
systemctl enable firewalld
查看防火墙状态
代码语言:javascript
复制[root@ecs-kunpeng ~]# systemctl status firewalld
● firewalld.service - firewalld - dynamic firewall daemon
Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled)
Active: active (running) since Tue 2021-06-22 09:30:11 CST; 10min ago
Docs: man:firewalld(1)
Main PID: 21380 (firewalld)
Tasks: 2 (limit: 1538)
Memory: 33.3M
CGroup: /system.slice/firewalld.service
└─21380 /usr/libexec/platform-python -s /usr/sbin/firewalld --nofork --nopid
Jun 22 09:30:11 ecs-kunpeng systemd[1]: Starting firewalld - dynamic firewall daemon...
Jun 22 09:30:11 ecs-kunpeng systemd[1]: Started firewalld - dynamic firewall daemon.
查看防火墙开放端口
代码语言:javascript
复制[root@ecs-kunpeng ~]# firewall-cmd --list-ports
8024/tcp 33389/tcp 8080/tcp 443/tcp
查看防火墙状态
代码语言:javascript
复制[root@ecs-kunpeng ~]# firewall-cmd --state
running
查看防火墙规则
代码语言:javascript
复制[root@ecs-kunpeng ~]# firewall-cmd --list-all
public (active)
target: default
icmp-block-inversion: no
interfaces: eth0
sources:
services: cockpit dhcpv6-client ssh
ports: 8024/tcp 33389/tcp 8080/tcp 443/tcp
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family="ipv4" source address="49.74.123.90" port port="8024" protocol="tcp" accept
rule family="ipv4" source address="39.144.2.184" port port="8024" protocol="tcp" accept
设置指定IP地址访问特定端口
代码语言:javascript
复制#允许ip192.168.0.1访问9001端口
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="192.168.0.1" port protocol="tcp" port="9001" accept"
# source address="192.168.0.1"//访问端口的公网IP地址
# port="9001" //访问客户端的端口号
#重新载入一下防火墙设置,使设置生效
firewall-cmd --reload
#查看已设置规则
firewall-cmd --zone=public --list-rich-rules
删除防火墙设置的规则
代码语言:javascript
复制#停止客户端运行nps服务
#移除ip192.168.0.1访问9001端口
firewall-cmd --permanent --remove-rich-rule="rule family="ipv4" source address="192.168.0.1" port protocol="tcp" port="9001" accept"
#重新载入一下防火墙设置,使设置生效
firewall-cmd --reload
#查看已设置规则
firewall-cmd --zone=public --list-rich-rules
[root@ecs-kunpeng ~]# firewall-cmd --list-all
public (active)
target: default
icmp-block-inversion: no
interfaces: eth0
sources:
services: cockpit dhcpv6-client ssh
ports: 8024/tcp 33389/tcp 8080/tcp 443/tcp
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family="ipv4" source address="39.144.2.184" port port="8024" protocol="tcp" accept
rule family="ipv4" source address="49.74.123.90" port port="8024" protocol="tcp" accept
rule family="ipv4" source address="223.104.147.74" port port="8024" protocol="tcp" accept