On 17/04/18 20:12, Chris Adams wrote:
> I am trying to get a handle on firewalld... I can't actually see right
> off how to limit access to services to certain sources.  For example, on
> a single-interface server, I want to limit access to SSH and SNMP to
> some "management" networks.  With iptables, I might have:
>
>    *filter
>    :INPUT ACCEPT [0:0]
>    :FORWARD ACCEPT [0:0]
>    :OUTPUT ACCEPT [0:0]
>    :mgmt - [0:0]
>
>    -A INPUT -i lo -j ACCEPT
>    -A INPUT -p tcp --syn --dport http -j ACCEPT
>    -A INPUT -p tcp --syn --dport ssh -j mgmt
>    -A INPUT -p udp --dport snmp -j mgmt
>
>    -A mgmt -s 10.0.0.0/24 -j ACCEPT
>    -A mgmt -s 10.1.0.0/24 -j ACCEPT
>    -A mgmt -p tcp -j REJECT --reject-with tcp-reset
>    -A mgmt -j DROP
>
> That means a couple of subnets can reach whatever management services I
> declare, the rest of the network cannot, and HTTP is just wide open.
>
> I set a bunch of different documents talking about assigning interfaces
> and services to zones, but nothing that tells me how to use those zones
> to do something useful.
>
Here's how I'd set up limited access to SSH and SNMP

firewall-cmd --permanent --add-source=10.0.0.0/24 --zone=trusted
firewall-cmd --permanent --add-source=10.1.0.0/24 --zone=trusted
firewall-cmd --permanent --zone=trusted --add-service=ssh --add-service=snmp
firewall-cmd --permanent --zone=public --remove-service=ssh
--remove-service=snmp
firewall-cmd --reload

The 'zone=public' bit, that's my internet facing zone, to figure out
which zones are allowing what, run

firewall-cmd --list-all-zones

and adjust the commands I posted accordingly to add / remove anything

Hope this helps
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org

Reply via email to