-
Notifications
You must be signed in to change notification settings - Fork 366
New beginners guide to firewalld #550
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
* tested rules using an LXD container * did an editing pass checking word usage, commas, and general feel * would really, really, really like some input on this
|
I would love someone to review this with a technical eye, particularly if you have experience using |
* wrong word, "form" instead of "from" fixed * admonition indentation that @wsoyinka added is fixed * added the update meta * a couple of other minor fixes
|
Alright, I gave it an editing pass, adding some bits I thought might be useful. I only have one overall piece of feedback: this isn't strictly a beginner's guide to Later on, I could take a lot of what's here and give it the absolute newbie treatment if y'all think that would be good. |
* Ezequiel Bruni brought up a good point that this wasn't so much a beginners guide to firewalld, but an iptables guide to using firewalld.
|
Could we add a paragraph with instructions on how to check firewall state ? Something like this: Remember to check the status of your firewall with either : the command the |
|
I like the Common firewall-cmd Commands table 👍 |
|
What about adding a paragraph about testing if a port is open ? The |
* added some additional explanation with regard to the `--runtime-to-peermanent` option * corrected a word usage issue * added sections for Database and DNS
| |`firewall-cmd --runtime-to-permanent`| if you have entered many rules without the --permanent option, do this before reloading. | | ||
|
|
||
| There are a great many `firewall-cmd` options not covered here, but this gives you the most used commands. | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Testing connections
System administrators are very fond of the telnet command to perform their tests and verify that a port is open and accessible.
Today, the recommended command is nc (netcat) which you can use as follows:
nc -zv 192.168.1.10 22
The -u option is use to test udp port by the same way.
Add firewall state testing from @alemorvan Co-authored-by: Antoine Le Morvan <antoine@le-morvan.com>
* made final changes from the editing pass providedd by Ezequiel and the suggested changes provided by Antoine * one final bit of rewording to help clarify things * will merge this now!
Author checklist (Completed by original Author)
Rocky Documentation checklist (Completed by Rocky team)