Firewalld configuration instances (multiple) and firewalld instances
Example 1: clients in the 172.24.0.0/24 domain cannot access your VM system.
(1)
[Root @ override top0 ~] # Firewall-cmd -- add-rich-rule "rule family =" ipv4"
Source address = "172.24.0.0/24" service name = "ssh" reject"
Success
[Root @ override top0 ~] # Firewall-cmd -- add-rich-rule "rule family =" ipv4"
Source address = "172.24.0.0/24" service name = "ssh" reject "-- per
Success
(2)
[Root @ server0 ~] # Firewall-cmd -- add-rich-rule "rule family =" ipv4"
Source address = "172.25.0.10" port = "3260" protocol = "tcp" accept"
[Root @ server0 ~] # Firewall-cmd -- add-rich-rule "rule family =" ipv4"
Source address = "172.25.0.10" port = "3260" protocol = "tcp" accept"
Example 2: In the 172.25.0.0/24 network, the local port 5423 accessing desktopX will be forwarded to 80.
[Root @ override top0 ~] # Firewall-cmd -- add-rich-rule "rule family =" ipv4"
Source address = "172.25.0.0/24" forward-port = "5423" protocol = "tcp" to-port = "80 ""
Success
[Root @ override top0 ~] # Firewall-cmd -- add-rich-rule "rule family =" ipv4"
Source address = "172.25.0.0/24" forward-port = "5423 "? Protocol = "tcp" to-port = "80" "-- per
Success
Example 3: allowed services
[Root @ server0 ~] # Firewall-cmd -- add-service = https
Success
[Root @ server0 ~] # Firewall-cmd -- add-service = https -- per
Success