Start FIREWALLD service:?
1 2 |
Systemctl Enable Firewalld.service #设置开机启动 systemctl start Firewalld.service #开启服务 |
View firewall status:?
1 |
Systemctl Status Firewalld |
1. Regional management
1.1. Network Area Profile
By dividing the network into different regions, an access control strategy between different regions is developed to control the data flow between different program regions. For example, the Internet is an untrusted area, and an internal network is a highly trusted area. The network security model can be initialized during installation, initial startup, and the first time a network connection is established. This model describes the trust level of the entire network environment to which the host is connected and defines how the new connection is handled. There are several different initialization areas:
Blocked zone (block): Any incoming network packets will be blocked.
Work area (work): believe that other computers on the network will not damage your computer.
Home area: Believe that other computers on the network will not harm your computer.
Common area (public): Do not trust any computers on the network, only choose to accept incoming network connections.
Isolation Zone (DMZ): An isolated area, also known as a demilitarized zone, is buffered by an added layer of network between the internal and external networks. For an isolated zone, only select to accept incoming network connections.
Trust Zone (trusted): All network connections are acceptable.
Drop area (drop): Any incoming network connections are rejected.
Internal area (internal): Trust other computers on the network without compromising your computer. Only select to accept incoming network connections.
External area (external): Do not trust other computers on the network and do not damage your computer. Only select to accept incoming network connections.
Note: The default area for FIREWALLD is public.
1.2. Display a list of supported zones?
1 |
Firewall-cmd--get-zones |
1.3. Set as Home area?