1. 程式人生 > >centOS7.2防火墻常用配置(轉)

centOS7.2防火墻常用配置(轉)

ngs proc sel reject 部分 gen commit ddr out

centOS7.2防火墻常用配置

firewall-cmd --state #查看默認防火墻狀態(關閉後顯示not running,開啟後顯示running)

systemctl stop firewalld.service #停止firewall

systemctl disable firewalld.service #禁止firewall開機啟動

systemctl start firewalld.service #開啟防火墻

systemctl enable firewalld.service #開機開啟防火墻

firewall-cmd --zone=public(作用域) --add-port=80/tcp(端口和訪問類型) --permanent(永久生效) #開啟80端口

firewall-cmd --zone= public --remove-port=80/tcp --permanent #刪除80端口

firewall-cmd --list-ports #查看已開放的端口(默認不開放任何端口)

當我們修改了某些配置之後(尤其是配置文件的修改),firewall並不會立即生效。可以通過兩種方式來激活最新配置

systemctl restart firewalldfirewall-cmd --reload 兩種方式,前一種是重啟firewalld服務,建議使用後一種“重載配置文件”。

重載配置文件之後不會斷掉正在連接的tcp會話,而重啟服務則會斷開tcp會話。

一、firewall介紹
CentOS 7中防火墻是一個非常的強大的功能,在CentOS 6.5中在iptables防火墻中進行了升級了。

1、官方介紹

The dynamic firewall daemon firewalld provides a dynamically managed firewall with support for network “zones” to assign a level of trust to a network and its associated connections and interfaces. It has support for IPv4 and IPv6 firewall settings. It supports Ethernet bridges and has a separation of runtime and permanent configuration options. It also has an interface for services or applications to add firewall rules directly.

2、什麽是區域Zone:

網絡區域定義了網絡連接的可信等級。這是一個 一對多的關系,這意味著一次連接可以僅僅是一個區域的一部分,而一個區域可以用於很多連接。

3、哪個區域可用?

由firewalld 提供的區域按照從不信任到信任的順序排序。

4、區域的分類?

Firewalls can be used to separate networks into different zones based on the level of trust the user has decided to place on the devices and traffic within that network. NetworkManager informs firewalld to which zone an interface belongs. An interface’s assigned zone can be changed by NetworkManager or via the firewall-config tool which can open the relevant NetworkManager window for you.

The zone settings in /etc/firewalld/ are a range of preset settings which can be quickly applied to a network interface. They are listed here with a brief explanation:

drop
Any incoming network packets are dropped, there is no reply. Only outgoing network connections are possible.

block
Any incoming network connections are rejected with an icmp-host-prohibited message for IPv4 and icmp6-adm-prohibited for IPv6. Only network connections initiated from within the system are possible.

public
For use in public areas. You do not trust the other computers on the network to not harm your computer. Only selected incoming connections are accepted.

external
For use on external networks with masquerading enabled especially for routers. You do not trust the other computers on the network to not harm your computer. Only selected incoming connections are accepted.

dmz
For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.

work
For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.

home
For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.

internal
For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.

trusted
All network connections are accepted.
It is possible to designate one of these zones to be the default zone. When interface connections are added to NetworkManager, they are assigned to the default zone. On installation, the default zone in firewalld is set to be the public zone.

註:具體內容,請參見官方文檔介紹!

二、firewall配置
The configuration for firewalld is stored in various XML files in /usr/lib/firewalld/ and /etc/firewalld/.

This allows a great deal of flexibility as the files can be edited, written to, backed up, used as templates for other installations and so on.

註意:以下firewalld 的操作只有重啟之後才有效:service firewalld restart 重啟

1、系統配置目錄

/usr/lib/firewalld/services
1
目錄中存放定義好的網絡服務和端口參數,系統參數,不能修改。

2、用戶配置目錄

/etc/firewalld/
1


3、如何自定義添加端口

用戶可以通過修改配置文件的方式添加端口,也可以通過命令的方式添加端口,註意,修改的內容會在/etc/firewalld/ 目錄下的配置文件中還體現。

3.1、命令的方式添加端口
firewall-cmd --permanent --add-port=9527/tcp
1
參數介紹:

1、firewall-cmd:是Linux提供的操作firewall的一個工具;
2、--permanent:表示設置為持久;
3、--add-port:標識添加的端口;
1
2
3
另外,firewall中有Zone的概念,可以將具體的端口制定到具體的zone配置文件中。

例如:添加8010端口

firewall-cmd --zone=public --permanent --add-port=8010/tcp
1
--zone=public:指定的zone為public;
1
添加結果如下:

如果–zone=dmz 這樣設置的話,會在dmz.xml文件中新增一條。

3.2、修改配置文件的方式添加端口
<?xml version="1.0" encoding="utf-8"?>
<zone>
<short>Public</short>
<description>For use in public areas.</description>
<rule family="ipv4">
<source address="122.10.70.234"/>
<port protocol="udp" port="514"/>
<accept/>
</rule>
<rule family="ipv4">
<source address="123.60.255.14"/>
<port protocol="tcp" port="10050-10051"/>
<accept/>
</rule>
<rule family="ipv4">
<source address="192.249.87.114"/> 放通指定ip,指定端口、協議
<port protocol="tcp" port="80"/>
<accept/>
</rule>
<rule family="ipv4"> 放通任意ip訪問服務器的9527端口
<port protocol="tcp" port="9527"/>
<accept/>
</rule>
</zone>
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
上述的一個配置文件可以很好的看出:

1、添加需要的規則,開放通源ip為122.10.70.234,端口514,協議tcp;
2、開放通源ip為123.60.255.14,端口10050-10051,協議tcp;/3、開放通源ip為任意,端口9527,協議tcp;
1
2
三、firewall常用命令
1、重啟、關閉、開啟firewalld.service服務

service firewalld restart 重啟
service firewalld start 開啟
service firewalld stop 關閉
1
2
3
2、查看firewall服務狀態

systemctl status firewall
1
3、查看firewall的狀態

firewall-cmd --state
1


4、查看防火墻規則

firewall-cmd --list-all
1


四、CentOS切換為iptables防火墻
切換到iptables首先應該關掉默認的firewalld,然後安裝iptables服務。

1、關閉firewall:

service firewalld stop
systemctl disable firewalld.service #禁止firewall開機啟動
1
2
2、安裝iptables防火墻

yum install iptables-services #安裝
1
3、編輯iptables防火墻配置

vi /etc/sysconfig/iptables #編輯防火墻配置文件
1
下邊是一個完整的配置文件:

Firewall configuration written by system-config-firewall

Manual customization of this file is not recommended.

*filter

:INPUT ACCEPT [0:0]

:FORWARD ACCEPT [0:0]

:OUTPUT ACCEPT [0:0]

-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

-A INPUT -p icmp -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT

-A INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT

-A INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT

-A INPUT -j REJECT --reject-with icmp-host-prohibited

-A FORWARD -j REJECT --reject-with icmp-host-prohibited

COMMIT
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
:wq! #保存退出

service iptables start #開啟
systemctl enable iptables.service #設置防火墻開機啟動
---------------------
作者:徐劉根
來源:CSDN
原文:https://blog.csdn.net/xlgen157387/article/details/52672988
版權聲明:本文為博主原創文章,轉載請附上博文鏈接!

centOS7.2防火墻常用配置(轉)