Firewalld is utility that allow us to manage firewall rules. It is is the default firewall on Centos.
Install and starting firewalld.
Some CentOS systems may not have firewalld. To install it, enter:
yum install firewalld
For automatic start, enter:
systemctl enable firewalld
And to start the service:
systemctl start firewalld
General commands for managing firewalld
View Status:
firewall-cmd --state
Reload a firewalld configuration when you make change to rules:
firewall-cmd --reload
Reload rules and reset current connections:
firewall-cmd --complete-reload
View created rules:
firewall-cmd --list-all
Stop service:
systemctl stop firewalld
Start service:
systemctl start firewalld
Disable autorun:
systemctl disable firewalld
Enable autorun:
systemctl enable firewalld
Save the current rules, make them permanent:
firewall-cmd --runtime-to-permanent
Rule Management of firewalld:
General syntax for working with rules:
firewall-cmd [option] [zone] <rule>
- [option] – additional parameters for the created rule, for example –permanent – a permanent rule, that is, it will be effective after a reboot. Not required.
- [zone] – by default, rules are created for the public zone. To work with a specific zone, it must be specified, for example, –zone=dmz. Not required.
- <rule> – the rule itself. Required.
Adding ports firewalld:
For Open port 80:
firewall-cmd --permanent --add-port=80/tcp
–permanent – it is a key which allows to add permanent rule.
Add a rule for a specific zone:
firewall-cmd --permanent --zone=external --add-port=80/tcp
Add port range:
firewall-cmd --permanent --add-port=6000-6200/udp
Add multiple rules with one command:
firewall-cmd --permanent --add-port=80/tcp --add-port=443/tcp
Adding a service in firewalld
Using services instead of ports can improve the ease of managing rules by combining multiple ports into a single service.
View a list of available services:
firewall-cmd --get-services
Allow the port, for example, for the ntp service:
firewall-cmd --permanent --add-service=ntp
Create your own service:
firewall-cmd --permanent --new-service=name-service
Add a port such as TCP 3400 to the service:
firewall-cmd --permanent --service=name-service --add-port=3400/tcp
Set a description for convenience:
firewall-cmd --permanent --service=name-service --set-short="Service for service"
firewall-cmd --permanent --service=name-service --set-description="Long Description For Service"
Information about the created service can be obtained with the command:
firewall-cmd --info-service=name-service
Now the created service can be used to create rules, for example:
firewall-cmd --permanent --add-service=name-service
How to create rules with conditions(Rich-rule)
rich-rule allows you to create rules with conditions. Let’s look at a few examples:
We allow the http service with the condition that requests will be from certain IP addresses (subnet 192.168.0):
firewall-cmd --permanent --add-rich-rule 'rule family="ipv4" source address="192.168.0.0/24" service name="http" accept'
Or for a specific port:
firewall-cmd --permanent --add-rich-rule 'rule family="ipv4" source address="192.168.0.0/24" port port="3333" protocol="tcp" accept'
To block a subnet, you can use the command:
firewall-cmd --permanent --add-rich-rule="rule family='ipv4' source address='192.168.5.0/24' reject"
The list of rules with conditions can be displayed with the command:
firewall-cmd --list-rich-rules
How to delete rules in firewalld?
Similar to creation, but instead of add we type remove, for example –remove-port (remove the port) or –remove-service (service).
Remove the rule to open port 80:
firewall-cmd --permanent --remove-port=80/tcp
How to manage zones?
All rules in firewalld can be zoned. Each has its own set of rules and its own network interfaces. This should be used if we want to make rules different in severity for different network adapters.
View a list of all available zones:
firewall-cmd --list-all-zones
View the list of used zones:
firewall-cmd --get-active-zones
Information about a specific zone:
firewall-cmd --list-all --zone=public
Create a rule for the public zone:
firewall-cmd --permanent --zone=public --add-port=80/tcp
Add a network interface to the zone:
firewall-cmd --permanent --zone=public --remove-interface=ens33
firewall-cmd --permanent --zone=internal --add-interface=ens33
First you need to remove the adapter from the current zone.
Set the default action for a zone:
firewall-cmd --permanent --zone=public --set-target=DROP
Create a new zone:
firewall-cmd --permanent --new-zone=custom_zone
If you want to practice firewalld, watch video below.