similar to: C7 and firewalld, ongoing

Displaying 20 results from an estimated 50000 matches similar to: "C7 and firewalld, ongoing"

2019 Feb 05
0
Back to c7 and firewalld
If I've missed someone's response, apologies. As I said, my converted rules seem fine, and I can run the script that issues a bunch of direct rules for the built-in FORWARD rule... but when I try firewall-cmd --reload, it tells me error, that FORWARD is a built-in. Now, today, what I've been looking at is to run iptables-save, and what I see is this (in part): -A FORWARD -m conntrack
2014 Jul 15
3
FirewallD and Network manager on production servers (C7)
Hi List, Are you really using firewalld and network-manager on Centos 7 production servers or old way disabling network manager and using pure iptables like on C6? -- Eero
2017 Dec 29
1
OpenVPN server and firewalld
On Fri, Dec 29, 2017 at 10:32 AM, Kenneth Porter <shiva at sewingwitch.com> wrote: > How do I insert the iptables rule below using firewalld? > > I'm moving up from CentOS 6 to 7 on an office gateway and I'm trying to > get OpenVPN working to allow home workers to access PCs at the office. I've > got it all working but only by manually inserting an ACCEPT rule in
2019 Jan 31
3
C7, firewalld and rich rules
On Jan 31, 2019, at 11:12 AM, mark <m.roth at 5-cent.us> wrote: > > Why would *ANYONE* think that everyone should just start from scratch, > taking all the time in the world to get it converted? If the conversion were simple enough to be easily automated, the new system is probably no more than just a syntactic difference away from the old, and thus does not provide any
2019 Jan 18
2
C7 and firewalld and ethernet bridge
Does someone have a link to a how-to-do-it with firewalld, not "disable firewalld and use iptables"? mark
2019 Jan 31
1
C7, firewalld and rich rules
On Thu, 31 Jan 2019 at 13:13, mark <m.roth at 5-cent.us> wrote: > Gordon Messmer wrote: > > On 1/30/19 10:05 PM, Simon Matter via CentOS wrote: > > > >> Did you look at Shorewall? IMHO that's what is best used in such > >> situations and it works since many years now. > > > > shorewall doesn't support nftables, which is largely the point
2019 Jan 31
4
C7, firewalld and rich rules
On 1/30/19 10:05 PM, Simon Matter via CentOS wrote: > Did you look at Shorewall? IMHO that's what is best used in such > situations and it works since many years now. shorewall doesn't support nftables, which is largely the point of firewalld:? The Linux firewall system is currently undergoing yet another deprecation and migration from iptables to nftables. firewalld should
2019 Jan 31
0
C7, firewalld and rich rules
Warren Young wrote: > On Jan 31, 2019, at 11:12 AM, mark <m.roth at 5-cent.us> wrote: >> >> Why would *ANYONE* think that everyone should just start from scratch, >> taking all the time in the world to get it converted? > > If the conversion were simple enough to be easily automated, the new > system is probably no more than just a syntactic difference away from
2018 Nov 11
1
Drop/Terminate data to/from source using firewalld rich rules
I need to be able to temporarily cut off the source of network slowdowns. What I used to do: Router with 2 x NICs running slackware 14. Execute iptraf-ng, choose IP Network Monitor and sort by Byte Count. The sorted screen always seemed a bit confusing but I could usually pluck a couple of IP addresses with racing byte counts and cut all traffic to them using an iptables rule. Then if I wanted to
2017 Jun 06
3
C6 or C7 for an old netbook
On Mon, 5 Jun 2017, m.roth at 5-cent.us wrote: > Mmmm... looks like I may go for C6, then, since unlike that Ubuntu, I will > want to do updates at least every time I get ready for a trip (other > times, it sits in the closet turned off). I went for C6 on a Samsung NC10 (1.6GHz Atom N270 1GB RAM), only because it refused to boot off the C7 ISO for some reason, and I didn't want to
2015 May 09
2
firewalld trouble opening a port
Hi Earl, >The problem is you added the rule in runtime and when you reloaded it >removed the rule that you added; therefore you need to use --permanent >or >do not reload. Thanks! That worked. [root at appd:~] #firewall-cmd --zone=home --list-ports [root at appd:~] #firewall-cmd --zone=home --add-port=8181/tcp --permanent success [root at appd:~] #firewall-cmd --reload success [root
2018 Oct 25
0
Stupid C7 firewall question
On 10/25/18 2:41 AM, Warren Young wrote: > On Oct 24, 2018, at 8:06 PM, Joel Freeman <joel at joelazot.xyz> wrote: >> >> Is there any reason to use Firewalld over IPTables? > > Lots: https://firewalld.org/ > >> I'm incredibly new to Linux administration > > Given that, which would you rather type: > > $ sudo firewall-cmd
2017 Oct 30
1
Contrib Request, SSH FirewallD
Hello, I would like permission to contribute information to the wiki... Username: CaseyDoyle To append an additional method for ssh blocking with firewallD: Page: https://wiki.centos.org/HowTos/Network/SecuringSSH#head-3579222198adaf43a3ecbdc438ebce74da40d8ec Suggest to add the following info to it pertinent section: ------ 6. Filter SSH at the Firewall complementary to iptables method,
2019 Apr 26
0
firewalld configuration for securing SSH
Hi there, Wouldn't that be a better solution to create a custom xml file to put in /etc/firewalld and load that "ssh-custom" service instead ? Thanks On 26/04/2019, Kimberlee Integer Model <kimee.i.model at gmail.com> wrote: > Thank you, I've gone in and made the listed changes changed firewalld > sections to use services instead of just port numbers. > > --
2015 May 09
0
firewalld trouble opening a port
On 9 May 2015 at 14:57, Tim Dunphy <bluethundr at gmail.com> wrote: > Hey all, > > I'm having a little trouble opening up a port on a C7 machine. > > Here's the default zone: > > [root at appd:~] #firewall-cmd --get-default-zone > home > > So I try to add the port: > > [root at appd:~] #firewall-cmd --zone=home --add-port=8181/tcp > success
2016 Feb 03
0
strange behavior of firewalld and port-forwarding
HI, me and firewalld won't have a good start, but I hope we'll be good friends. One of my hosts must rerote traffic from one to another host. It isn't a big problem. I've a host witch must do: 1) forwarding port 25 tcp to a second host Here I've a special mail-relay. My external.xml look like this one: <?xml version="1.0" encoding="utf-8"?>
2019 Apr 26
0
firewalld configuration for securing SSH
No, I think the rules you created might have a better place in a custom xml file instead of being given to firewall cmd directly :) On Fri, 26 Apr 2019 at 23:01, Kimberlee Integer Model < kimee.i.model at gmail.com> wrote: > I'm not sure I follow, you just think the modified one should be called > "ssh-custom", or you think there shouldn't be a modified service file
2019 Apr 25
0
firewalld configuration for securing SSH
On Wed, Apr 24, 2019 at 12:13 AM Kimberlee Integer Model <kimee.i.model at gmail.com> wrote: > > HI all, > > 1st time contributor here. I was using the guide on securing SSH, and > noticed that the firewall-cmd snippets for filtering by requests per > time seem somewhat outdated. From what I can tell the given snippets, > relay arguments directly down to iptables, and do
2019 Apr 24
3
firewalld configuration for securing SSH
HI all, 1st time contributor here. I was using the guide on securing SSH, and noticed that the firewall-cmd snippets for filtering by requests per time seem somewhat outdated. From what I can tell the given snippets, relay arguments directly down to iptables, and do not cover both IPv4 and v6. (and in fact when attempting to extend to v6 the firewall would fail to reload). I came up with an
2019 Apr 30
0
firewalld configuration for securing SSH
Thibaut, I did a little more reading, and according to both firewalld.service(5) and firewalld.org the service XML files, can only handle source/destination/port, and cannot handle the actions to be performed. I will update where possible to use the service files, but log/accept limit will still need to be encoded in rich rules. -- Kimee On Mon, 2019-04-29 at 20:43 -0400, Kimberlee Integer Model