CentOS7、REHL7的firewalld防火墙使用简单说明
title: CentOS7、REHL7的firewalld防火墙使用简单说明
categories: Linux
tags:
- Linux
timezone: Asia/Shanghai
date: 2019-02-25
区域 | 默认规则策略 |
trusted | 允许所有的数据包 |
home | 拒绝流入的数据包,除非与输出流量数据包相关或是ssh,mdns,ipp-client,samba-client与dbcpv6-client |
internal | 等同于home |
work | 拒绝流入的数据包,除非与流出流量数据包相关或是ssh,ipp-client与dhcpv6-client服务则允许 |
public | 拒绝流入的数据包,除非与流出流量数据包相关或是ssh,dhcpv6-client服务则允许 |
external | 拒绝流入的数据包,除非与流出流量数据包相关或是ssh,dhcpv6-client服务则允许 |
dmz | 拒绝流入的数据包,除非与流出流量数据包相关 |
block | 拒绝流入的数据包,除非与流出流量数据包相关 |
drop | 拒绝流入的数据包,除非与流出流量数据包相关 |
查询网卡的区域:
[root@Centos7 ~]# firewall-cmd --get-zone-of-interface=eno16777736
public
在public中分别查询ssh与http服务是否被允许:
[root@Centos7 ~]# firewall-cmd --zone=public --query-service=ssh
yes
[root@Centos7 ~]# firewall-cmd --zone=public --query-service=http
no
设置默认规则为dmz:
[root@Centos7 ~]# firewall-cmd --set-default-zone=dmz
success
让“永久生效”的配置文件立即生效:
[root@Centos7 ~]# firewall-cmd --reload
success
启动/关闭应急状况模式,阻断所有网络连接:
应急状况模式启动后会禁止所有的网络连接,一切服务的请求也都会被拒绝,当心,请慎用。
[root@Centos7 ~]# firewall-cmd --panic-on
success
[root@Centos7~]# firewall-cmd --panic-off
success
将访问主机888端口的请求转发至22端口:
[root@Centos7 ~]# firewall-cmd --permanent --zone=public --add-forward-port=port=:proto=tcp:toport=:toaddr=192.168.0.85
success
[root@Centos7 ~]# firewall-cmd --reload
success
在别的机器访问192.168.0.85(Centos7)
[root@wls12c ~]$ ssh -p 192.168.0.85
root@192.168.0.85's password:
Last login: Mon Jan :: from 192.168.0.85
[root@Centos7 ~]#
环境
[root@centos181001 zones]# cat /etc/centos-release
CentOS Linux release 7.6.1810 (Core) [root@redhat73 home]# firewall-cmd -V
0.5.3
基本使用
1.启动和停止
systemctl start firewalld.service # 启动firewalld服务
systemctl stop firewalld.service # 停止firewalld服务
systemctl status firewalld.service # 查看firewalld服务状态 systemctl enable firewalld.service # 开机自动启动
systemctl disable firewalld.service # 禁用开机自动启动
2.查看状态
firewall-cmd -V # 查看firewalld的版本信息
firewall-cmd --state # 查看运行状态 firewall-cmd --list-services # 查看允许访问的服务
firewall-cmd --list-ports # 查看允许访问的端口
firewall-cmd --list-all # 查看所有允许的 firewall-cmd --get-default-zone # 查看默认zone
firewall-cmd --get-active-zones # 查看当前生效的zone firewall-cmd --list-all-zones # 列出所有zone配置
3.开放服务
## 开放和删除端口
firewall-cmd --add-port=/tcp
firewall-cmd --remove-port=/tcp ## 批量开放和批量删除端口
firewall-cmd --add-port=-/tcp
firewall-cmd --add-port=-/udp ## 添加和删除服务
firewall-cmd --add-service=http
firewall-cmd --remove-service=http ## 允许指定IP/IP段访问某端口
firewall-cmd --add-rich-rule="rule family="ipv4" source address="11.11.11.62" port protocol="tcp" port="" accept"
firewall-cmd --add-rich-rule="rule family="ipv4" source address="11.11.11.0/" port protocol="tcp" port="" accept" ## 允许某IP/IP段的所有访问
firewall-cmd --add-rich-rule="rule family="ipv4" source address="11.11.11.62" accept"
firewall-cmd --add-rich-rule="rule family="ipv4" source address="11.11.11.0/" accept" ## 删除富规则
firewall-cmd --remove-rich-rule 'rule family="ipv4" source address="11.11.11.0/24" accept'
4.禁止某IP/IP段连接
firewall-cmd --add-rich-rule="rule family="ipv4" source address="11.11.11.0/" port port="" protocol="tcp" drop"
firewall-cmd --add-rich-rule="rule family="ipv4" source address="11.11.11.0/" drop"
5.查看当前生效设置和已保存设置
firewall-cmd --list-all # 查看所有允许的 - 当前已生效设置
firewall-cmd --get-active-zones # 查看当前生效的zone cat /etc/firewalld/zones/public.xml # 查看``public``区域的已保存设置
6.保存配置
firewall-cmd --runtime-to-permanent # 保存配置 firewall-cmd --reload # 重新加载防火墙并保留状态信息
firewall-cmd --complete-reload # 重新加载防火墙并丢失状态信息
7.使用流程说明
.首先查看当前防火墙状态是否开放
.查看当前允许访问的端口和服务
.查看默认的zone和当前生效的zone(一般使用``public``作为平时使用的zone)
这里说了是一般情况下都会使用``plulic``作为平时使用的zone
所以不排除特殊情况或经过自己自定义的zone
zone的设计本身就是为了切换不同网络的时候不用来回重新配置防火墙而设计的
比如平时用``public``,但是服务器检修的时候使用``drop``
或者平时使用``public``,但是这个是我自己笔记本上安装的系统,到单位以后需要切换``work``,所以直接全部指定``plulic``可能会出现异议
所以这里使用命令的时候都没有像其他教程里一样添加``--zone=public``来指定需要设置的zone,而首先确认当前生效zone后直接设置
.添加开放端口或服务
.保存配置
这里说明下,网上所有的教程里都有加``--permanent``选项以使当前命令直接保存到永久配置
我这里是采用类似Cisco网络设备的调试方式,先开放或者关闭某端口
然后确认没问题后,运行``firewall-cmd --runtime-to-permanent``命令保存配置
如果刚才的命令执行有问题可以直接重新重启防火墙服务、重新加载配置或者重启服务器即可恢复到初始状态
这样操作手法可以避免因为误操作造成自己都连不上服务器的问题。
如果经常使用网络设备的小伙伴应该会很容易习惯这种方式
.关于和``iptables``关系
``firewall``和``iptables``都只是Linux系统下的防火墙配置和管理工具
通过``firewall-cmd``设置防火墙规则后同样支持使用``iptables -L -n``查看具体规则内容
同时CentOS7和REHL7下同样可以禁用``firewalld``,而使用``iptables``服务来设置和管理防火墙
8.设置服务器只允许某IP/IP段连接服务器SSH
firewall-cmd --add-rich-rule="rule family="ipv4" source address="11.11.11.62" port protocol="tcp" port="" accept"
firewall-cmd --remove-service=ssh
firewall-cmd --runtime-to-permanent # 保存配置
systemctl restart firewalld.service
常用选项
语法 | 释义 |
---|---|
firewall-cmd -h | 打印帮助信息 |
firewall-cmd -V | 查看firewalld的版本信息 |
firewall-cmd --state | 返回并打印firewalld状态 |
firewall-cmd --reload | 重新加载防火墙并保留状态信息 |
firewall-cmd --complete-reload | 重新加载防火墙并丢失状态信息 |
firewall-cmd --runtime-to-permanent | 从运行时配置创建永久配置 |
firewall-cmd --panic-on | 启用应急模式 |
firewall-cmd --panic-off | 禁用应急模式 |
firewall-cmd --query-panic | 查询是否启用了应急模式 |
firewall-cmd --list-services | 查看允许访问的服务 |
firewall-cmd --list-ports | 查看允许访问的端口 |
firewall-cmd --list-all | 查看所有允许的 |
firewall-cmd --add-port=80/tcp | 开放TCP的80端口 |
firewall-cmd --remove-port=80/tcp | 删除TCP的80端口 |
安装图形界面和使用
yum install -y firewall-config
firewall-config
firewall-cmd用法
Usage: firewall-cmd [OPTIONS...]
1.常规选项 - General Options
-h, --help Prints a short help text and exists # 打印帮助信息
-V, --version Print the version string of firewalld # 查看firewalld的版本信息
-q, --quiet Do not print status messages # 不打印状态消息
2.状态选项 - Status Options
--state Return and print firewalld state # 返回并打印firewalld状态
--reload Reload firewall and keep state information # 重新加载防火墙并保留状态信息
--complete-reload Reload firewall and lose state information # 重新加载防火墙并丢失状态信息
--runtime-to-permanent
Create permanent from runtime configuration # 从运行时配置创建永久,保存配置
3.记录拒绝选项 - Log Denied Options
--get-log-denied Print the log denied value # 打印拒绝日志
--set-log-denied=<value> Set log denied value # 设置日志拒绝值
--get-ipset-types Print the supported ipset types # 打印支持的ipset类型
4.永久选择 - Permanent Options
--permanent Set an option permanently # 永久设置选项
Usable for options marked with [P] # 可用于标有[P]的选项
5.zone选项 - Zone Options
--get-default-zone Print default zone for connections and interfaces # 获取默认zone
--set-default-zone=<zone> Set default zone # 获取默认zone
--get-active-zones Print currently active zones # 获取当前活动zone
--get-zones Print predefined zones [P] # 获取所有预定义zone
--get-services Print predefined services [P] # 获取预定义区域
--get-icmptypes Print predefined icmptypes [P] # 打印预定义的icmp类型
--get-zone-of-interface=<interface>
Print name of the zone the interface is bound to [P] # 获取指定网卡绑定的zone
--get-zone-of-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
Print name of the zone the source is bound to [P] #
--list-all-zones
List everything added for or enabled in all zones [P] # 列出在所有zond中添加或启用的所有内容
--new-zone=<zone> Add a new zone [P only] # 添加新zone
--new-zone-from-file=<filename> [--name=<zone>]
Add a new zone from file with optional name [P only] # 从文件创建新zone
--delete-zone=<zone> Delete an existing zone [P only] # 删除现有zone
--load-zone-defaults=<zone>
Load zone default settings [P only] [Z] # 加载zone默认设置
--zone=<zone> Use this zone to set or query options, else default zone
Usable for options marked with [Z]
--get-target Get the zone target [P only] [Z]
--set-target=<target> Set the zone target [P only] [Z] #
--info-zone=<zone> Print information about a zone # 打印指定zone的相关信息
--path-zone=<zone> Print file path of a zone [P only] #
6.IPSet选项 - IPSet Options
--get-ipset-types Print the supported ipset types
--new-ipset=<ipset> --type=<ipset type> [--option=<key>[=<value>]]..
Add a new ipset [P only]
--new-ipset-from-file=<filename> [--name=<ipset>]
Add a new ipset from file with optional name [P only]
--delete-ipset=<ipset>
Delete an existing ipset [P only]
--load-ipset-defaults=<ipset>
Load ipset default settings [P only]
--info-ipset=<ipset> Print information about an ipset
--path-ipset=<ipset> Print file path of an ipset [P only]
--get-ipsets Print predefined ipsets
--ipset=<ipset> --set-description=<description>
Set new description to ipset [P only]
--ipset=<ipset> --get-description
Print description for ipset [P only]
--ipset=<ipset> --set-short=<description>
Set new short description to ipset [P only]
--ipset=<ipset> --get-short
Print short description for ipset [P only]
--ipset=<ipset> --add-entry=<entry>
Add a new entry to an ipset [P]
--ipset=<ipset> --remove-entry=<entry>
Remove an entry from an ipset [P]
--ipset=<ipset> --query-entry=<entry>
Return whether ipset has an entry [P]
--ipset=<ipset> --get-entries
List entries of an ipset [P]
--ipset=<ipset> --add-entries-from-file=<entry>
Add a new entries to an ipset [P]
--ipset=<ipset> --remove-entries-from-file=<entry>
Remove entries from an ipset [P]
7.IcmpType选项 - IcmpType Options
--new-icmptype=<icmptype>
Add a new icmptype [P only] # 添加新的icmptype [仅限P]
--new-icmptype-from-file=<filename> [--name=<icmptype>]
Add a new icmptype from file with optional name [P only] # 从文件中添加一个带有可选名称的新icmptype [仅限P]
--delete-icmptype=<icmptype>
Delete an existing icmptype [P only] # 删除现有的icmptype [仅限P]
--load-icmptype-defaults=<icmptype>
Load icmptype default settings [P only] # 加载icmptype默认设置[仅限P]
--info-icmptype=<icmptype>
Print information about an icmptype # 打印有关icmptype的信息
--path-icmptype=<icmptype>
Print file path of an icmptype [P only] # 打印icmptype的文件路径[仅限P]
--icmptype=<icmptype> --set-description=<description>
Set new description to icmptype [P only] # 将新描述设置为icmptype [仅限P]
--icmptype=<icmptype> --get-description
Print description for icmptype [P only] # icmptype的打印说明[仅限P]
--icmptype=<icmptype> --set-short=<description>
Set new short description to icmptype [P only] # 将新的简短描述设置为icmptype [仅限P]
--icmptype=<icmptype> --get-short
Print short description for icmptype [P only] # 打印icmptype的简短描述[仅限P]
--icmptype=<icmptype> --add-destination=<ipv>
Enable destination for ipv in icmptype [P only] # 在icmptype中启用ipv的目标[仅限P]
--icmptype=<icmptype> --remove-destination=<ipv>
Disable destination for ipv in icmptype [P only] # 在icmptype中禁用ipv的目标[仅限P]
--icmptype=<icmptype> --query-destination=<ipv>
Return whether destination ipv is enabled in icmptype [P only] # 返回是否在icmptype中启用了目标ipv [仅限P]
--icmptype=<icmptype> --get-destinations
List destinations in icmptype [P only] # 在icmptype中列出目的地[仅限P]
8.服务选项 - Service Options
--new-service=<service>
Add a new service [P only]
--new-service-from-file=<filename> [--name=<service>]
Add a new service from file with optional name [P only]
--delete-service=<service>
Delete an existing service [P only]
--load-service-defaults=<service>
Load icmptype default settings [P only]
--info-service=<service>
Print information about a service
--path-service=<service>
Print file path of a service [P only]
--service=<service> --set-description=<description>
Set new description to service [P only]
--service=<service> --get-description
Print description for service [P only]
--service=<service> --set-short=<description>
Set new short description to service [P only]
--service=<service> --get-short
Print short description for service [P only]
--service=<service> --add-port=<portid>[-<portid>]/<protocol>
Add a new port to service [P only]
--service=<service> --remove-port=<portid>[-<portid>]/<protocol>
Remove a port from service [P only]
--service=<service> --query-port=<portid>[-<portid>]/<protocol>
Return whether the port has been added for service [P only]
--service=<service> --get-ports
List ports of service [P only]
--service=<service> --add-protocol=<protocol>
Add a new protocol to service [P only]
--service=<service> --remove-protocol=<protocol>
Remove a protocol from service [P only]
--service=<service> --query-protocol=<protocol>
Return whether the protocol has been added for service [P only]
--service=<service> --get-protocols
List protocols of service [P only]
--service=<service> --add-source-port=<portid>[-<portid>]/<protocol>
Add a new source port to service [P only]
--service=<service> --remove-source-port=<portid>[-<portid>]/<protocol>
Remove a source port from service [P only]
--service=<service> --query-source-port=<portid>[-<portid>]/<protocol>
Return whether the source port has been added for service [P only]
--service=<service> --get-source-ports
List source ports of service [P only]
--service=<service> --add-module=<module>
Add a new module to service [P only]
--service=<service> --remove-module=<module>
Remove a module from service [P only]
--service=<service> --query-module=<module>
Return whether the module has been added for service [P only]
--service=<service> --get-modules
List modules of service [P only]
--service=<service> --set-destination=<ipv>:<address>[/<mask>]
Set destination for ipv to address in service [P only]
--service=<service> --remove-destination=<ipv>
Disable destination for ipv i service [P only]
--service=<service> --query-destination=<ipv>:<address>[/<mask>]
Return whether destination ipv is set for service [P only]
--service=<service> --get-destinations
List destinations in service [P only]
9.Options to Adapt and Query Zones:适应和查询区域的选项
--list-all List everything added for or enabled in a zone [P] [Z]
--list-services List services added for a zone [P] [Z]
--timeout=<timeval>
Enable an option for timeval time, where timeval is a number followed by one of letters 's' or 'm' or 'h'
Usable for options marked with [T]
--set-description=<description>
Set new description to zone [P only] [Z]
--get-description Print description for zone [P only] [Z]
--set-short=<description>
Set new short description to zone [P only] [Z]
--get-short Print short description for zone [P only] [Z]
--add-service=<service>
Add a service for a zone [P] [Z] [T]
--remove-service=<service>
Remove a service from a zone [P] [Z]
--query-service=<service>
Return whether service has been added for a zone [P] [Z]
--list-ports List ports added for a zone [P] [Z]
--add-port=<portid>[-<portid>]/<protocol>
Add the port for a zone [P] [Z] [T]
--remove-port=<portid>[-<portid>]/<protocol>
Remove the port from a zone [P] [Z]
--query-port=<portid>[-<portid>]/<protocol>
Return whether the port has been added for zone [P] [Z]
--list-protocols List protocols added for a zone [P] [Z]
--add-protocol=<protocol>
Add the protocol for a zone [P] [Z] [T]
--remove-protocol=<protocol>
Remove the protocol from a zone [P] [Z]
--query-protocol=<protocol>
Return whether the protocol has been added for zone [P] [Z]
--list-source-ports List source ports added for a zone [P] [Z]
--add-source-port=<portid>[-<portid>]/<protocol>
Add the source port for a zone [P] [Z] [T]
--remove-source-port=<portid>[-<portid>]/<protocol>
Remove the source port from a zone [P] [Z]
--query-source-port=<portid>[-<portid>]/<protocol>
Return whether the source port has been added for zone [P] [Z]
--list-icmp-blocks List Internet ICMP type blocks added for a zone [P] [Z]
--add-icmp-block=<icmptype>
Add an ICMP block for a zone [P] [Z] [T]
--remove-icmp-block=<icmptype>
Remove the ICMP block from a zone [P] [Z]
--query-icmp-block=<icmptype>
Return whether an ICMP block has been added for a zone [P] [Z]
--add-icmp-block-inversion
Enable inversion of icmp blocks for a zone [P] [Z]
--remove-icmp-block-inversion
Disable inversion of icmp blocks for a zone [P] [Z]
--query-icmp-block-inversion
Return whether inversion of icmp blocks has been enabled for a zone [P] [Z]
--list-forward-ports List IPv4 forward ports added for a zone [P] [Z]
--add-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
Add the IPv4 forward port for a zone [P] [Z] [T]
--remove-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
Remove the IPv4 forward port from a zone [P] [Z]
--query-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
Return whether the IPv4 forward port has been added for a zone [P] [Z]
--add-masquerade Enable IPv4 masquerade for a zone [P] [Z] [T]
--remove-masquerade Disable IPv4 masquerade for a zone [P] [Z]
--query-masquerade
Return whether IPv4 masquerading has been enabled for a zone [P] [Z]
--list-rich-rules List rich language rules added for a zone [P] [Z]
--add-rich-rule=<rule>
Add rich language rule 'rule' for a zone [P] [Z] [T]
--remove-rich-rule=<rule>
Remove rich language rule 'rule' from a zone [P] [Z]
--query-rich-rule=<rule>
Return whether a rich language rule 'rule' has been added for a zone [P] [Z]
10.Options to Handle Bindings of Interfaces:处理接口绑定的选项
--list-interfaces
List interfaces that are bound to a zone [P] [Z] # 列出绑定到区域的接口[P] [Z]
--add-interface=<interface>
Bind the <interface> to a zone [P] [Z] # 将<interface>绑定到区域[P] [Z]
--change-interface=<interface>
Change zone the <interface> is bound to [Z] # 更改区域<interface>绑定到[Z]
--query-interface=<interface>
Query whether <interface> is bound to a zone [P] [Z] # 查询<interface>是否绑定到区域[P] [Z]
--remove-interface=<interface>
Remove binding of <interface> from a zone [P] [Z] # 从区域[P] [Z]中删除<interface>的绑定
11.Options to Handle Bindings of Sources:处理来源绑定的选项
--list-sources List sources that are bound to a zone [P] [Z] # 列出绑定到区域的源[P] [Z]
--add-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
Bind the source to a zone [P] [Z] # 将源绑定到区域[P] [Z]
--change-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
Change zone the source is bound to [Z] # 更改区域源绑定到[Z]
--query-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
Query whether the source is bound to a zone [P] [Z] # 查询源是否绑定到区域[P] [Z]
--remove-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
Remove binding of the source from a zone [P] [Z] # 从区域中删除源的绑定[P] [Z]
12.Direct Options
--direct First option for all direct options # 所有直接选项的第一选择
--get-all-chains Get all chains [P] # 获取所有链[P]
--get-chains {ipv4|ipv6|eb} <table>
Get all chains added to the table [P] # 将所有链添加到表中[P]
--add-chain {ipv4|ipv6|eb} <table> <chain>
Add a new chain to the table [P] # 在表中添加一个新链[P]
--remove-chain {ipv4|ipv6|eb} <table> <chain>
Remove the chain from the table [P] # 从表中删除链[P]
--query-chain {ipv4|ipv6|eb} <table> <chain>
Return whether the chain has been added to the table [P] # 返回是否已将链添加到表中[P]
--get-all-rules
Get all rules [P] # 获取所有规则[P]
--get-rules {ipv4|ipv6|eb} <table> <chain>
Get all rules added to chain in table [P] # 将所有规则添加到表中的链[P]
--add-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
Add rule to chain in table [P] # 在表[P]中添加规则到链
--remove-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
Remove rule with priority from chain in table [P] # 从表[P]中的链中删除具有优先级的规则
--remove-rules {ipv4|ipv6|eb} <table> <chain>
Remove rules from chain in table [P] # 从表[P]中的链中删除规则
--query-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
Return whether a rule with priority has been added to chain in table [P] # 返回是否已将具有优先级的规则添加到表[P]中的链
--passthrough {ipv4|ipv6|eb} <arg>...
Pass a command through (untracked by firewalld) # 通过命令(未触发过firewalld)
--get-all-passthroughs
Get all tracked passthrough rules [P] # 获取所有跟踪的直通规则[P]
--get-passthroughs {ipv4|ipv6|eb} <arg>...
Get tracked passthrough rules [P] # 跟踪直通规则[P]
--add-passthrough {ipv4|ipv6|eb} <arg>...
Add a new tracked passthrough rule [P] # 添加新的跟踪直通规则[P]
--remove-passthrough {ipv4|ipv6|eb} <arg>...
Remove a tracked passthrough rule [P] # 删除跟踪的直通规则[P]
--query-passthrough {ipv4|ipv6|eb} <arg>...
Return whether the tracked passthrough rule has been added [P] # 返回是否添加了跟踪的直通规则[P]
13.Lockdown Options:锁定选项
--lockdown-on Enable lockdown. # 启用锁定。
--lockdown-off Disable lockdown. # 禁用锁定
--query-lockdown Query whether lockdown is enabled # 查询是否启用了锁定
14.Lockdown Whitelist Options:锁定白名单选项
--list-lockdown-whitelist-commands
List all command lines that are on the whitelist [P] # 列出白名单中的所有命令行[P]#
--add-lockdown-whitelist-command=<command>
Add the command to the whitelist [P] # 将命令添加到白名单[P]
--remove-lockdown-whitelist-command=<command>
Remove the command from the whitelist [P] # 从白名单中删除命令[P]
--query-lockdown-whitelist-command=<command>
Query whether the command is on the whitelist [P] # 查询命令是否在白名单中[P]
--list-lockdown-whitelist-contexts
List all contexts that are on the whitelist [P] # 列出白名单中的所有上下文[P]
--add-lockdown-whitelist-context=<context>
Add the context context to the whitelist [P] # 将上下文上下文添加到白名单[P]
--remove-lockdown-whitelist-context=<context>
Remove the context from the whitelist [P] # 从白名单中删除上下文[P]
--query-lockdown-whitelist-context=<context>
Query whether the context is on the whitelist [P] # 查询上下文是否在白名单中[P]
--list-lockdown-whitelist-uids
List all user ids that are on the whitelist [P] # 列出白名单中的所有用户ID [P]
--add-lockdown-whitelist-uid=<uid>
Add the user id uid to the whitelist [P] # 将用户ID uid添加到白名单[P]
--remove-lockdown-whitelist-uid=<uid>
Remove the user id uid from the whitelist [P] # 从白名单中删除用户ID uid [P]
--query-lockdown-whitelist-uid=<uid>
Query whether the user id uid is on the whitelist [P] # 查询用户id uid是否在白名单中[P]
--list-lockdown-whitelist-users
List all user names that are on the whitelist [P] # 列出白名单中的所有用户名[P]
--add-lockdown-whitelist-user=<user>
Add the user name user to the whitelist [P] # 将用户名用户添加到白名单[P]
--remove-lockdown-whitelist-user=<user>
Remove the user name user from the whitelist [P] # 从白名单中删除用户名用户[P]
--query-lockdown-whitelist-user=<user>
Query whether the user name user is on the whitelist [P] # 从白名单中删除用户名用户[P]
15.应急模式 - Panic Options
--panic-on Enable panic mode # 启用应急模式
--panic-off Disable panic mode # 禁用应急模式
--query-panic Query whether panic mode is enabled # 查询是否启用了应急模式
链接:https://www.linuxidc.com/Linux/2017-01/139637.htm
链接:https://www.jianshu.com/p/463332787dde
CentOS7、REHL7的firewalld防火墙使用简单说明的更多相关文章
- centos7 firewall-cmd 用活firewalld防火墙中的zone
原文:http://www.excelib.com/article/290/show/ firewalld中zone的含义学生前面已经给大家介绍过了,说白了一个zone就是一套规则集.可是什么时候该用 ...
- CentOS7使用firewalld防火墙配置端口
安装启用firewalld防火墙 CentOS7默认的防火墙是firewalld 如果没有firewalld防火墙,可以执行yum install firewalld 命令进行安装 firewalld ...
- centos7 firewall-cmd 理解多区域配置中的 firewalld 防火墙
原文:https://www.linuxidc.com/Linux/2017-11/148795.htm 现在的新闻里充斥着服务器被攻击和数据失窃事件.对于一个阅读过安全公告博客的人来说,通过访问错误 ...
- CentOS7使用firewalld防火墙
firewalld的基本使用 启动: systemctl start firewalld 关闭: systemctl stop firewalld 查看状态: systemctl status fir ...
- CentOS7 firewalld防火墙规则
在CentOS7里有几种防火墙共存:firewalld.iptables.ebtables,默认是使用firewalld来管理netfilter子系统,不过底层调用的命令仍然是iptables等. f ...
- CentOS7 firewalld防火墙 启动 关闭 禁用 添加删除规则等 常用命令
CentOS7 firewalld防火墙 常用命令1.firewalld的基本使用启动: systemctl start firewalld关闭: systemctl stop firewalld查看 ...
- 19、Firewalld防火墙
安全的考虑方向: 安全框架 OSI七层模型 硬件 机架上锁(机柜) 温度 硬件检查 网络 iptables/firewalld 仅允许公司的IP地址能连接服务器的22端口 公有云使用 安全组 系统 没 ...
- 第8章 Iptables与Firewalld防火墙
章节简述: 红帽RHEL7系统已经用firewalld服务替代了iptables服务,新的防火墙管理命令firewall-cmd与图形化工具firewall-config. 本章节基于数十个防火墙需求 ...
- centos7开放端口和防火墙设置
centos7开放端口和防火墙设置. 查看防火墙状态: firewall-cmd --state 如果显示: not running 打开防火墙服务: systemctl start firewall ...
随机推荐
- 利用python打印字符
python unicode ('你好','UTF-8') print u'\u4f60\u597d'
- Java的家庭记账本程序(H) :微信小程序 image 标签,在模拟器中无法显示图片?(已解决)
日期:2019.2.25 博客期:036 星期一 吼!今天我还是继续研究了自己的微信小程序,还没有连接数据库,只是在xml的设计上添加了不少东西,大家可以看我的截图,嗯~说到今天的收获,就是 marg ...
- django 实战篇之路由层
路由层 如何给网页添加首页及尾页 urlpatterns = [ url(r'^admin/', admin.site.urls), url(r'test',views.test), url(r'te ...
- 阿里云ECS发送邮件到腾讯企业邮箱
1.安装软件 yum install mailx yum install sendmail 2.配置 vim /etc/mail.rc在文件最后加上如下内容: set smtp=smtps://smt ...
- cc.Node 的坐标空间与ACTION的学习
1.创建二维的向量坐标 //创建向量坐标方法一 let new_pos1 = new cc.Vec2(100, 100); //创建向量坐标方法二 let new_pos2 = cc.v2(200, ...
- Codeforces 750E New Year and Old Subsequence 线段树 + dp (看题解)
New Year and Old Subsequence 第一感觉是离线之后分治求dp, 但是感觉如果要把左边的dp值和右边的dp值合起来, 感觉很麻烦而且时间复杂度不怎么对.. 然后就gun取看题解 ...
- C - 树的统计Count - 树链剖分
思路 :树剖模板,线段树维护即可. #include<bits/stdc++.h> using namespace std; #define MID int m = (l+r)/2 #de ...
- 动态规划——Split Array Largest Sum
题意大概就是,给定一个包含非负整数的序列nums以及一个整数m,要求把序列nums分成m份,并且要让这m个子序列各自的和的最大值最小(minimize the largest sum among th ...
- sybase central 报 NullPointerException 解决
准备发布版本,但是要创建数据库的时候遇到了问题,发现之前可以正常打开的sybase Central 现在无法打开了.苦恼一段时间后找到如下解决方法. 报错如下: 解决如下: 正常打开:
- 2017-2018 ACM-ICPC, NEERC, Northern Subregional Contest
A. Auxiliary Project 完全背包. #include<stdio.h> #include<iostream> #include<string.h> ...