{"id":18,"date":"2023-06-04T20:08:22","date_gmt":"2023-06-04T12:08:22","guid":{"rendered":"https:\/\/www.xyblogs.com\/?p=18"},"modified":"2023-06-04T20:08:22","modified_gmt":"2023-06-04T12:08:22","slug":"firewalld%e9%98%b2%e7%81%ab%e5%a2%99%e5%91%bd%e4%bb%a4","status":"publish","type":"post","link":"https:\/\/www.xyblogs.com\/index.php\/2023\/06\/04\/firewalld%e9%98%b2%e7%81%ab%e5%a2%99%e5%91%bd%e4%bb%a4\/","title":{"rendered":"firewalld\u9632\u706b\u5899\u547d\u4ee4"},"content":{"rendered":"<p>firewalld\u9632\u706b\u5899\u547d\u4ee4<br \/>\n\u4f7f\u7528Firewalld\u5de5\u5177\u6765\u7ba1\u7406Linux\u9632\u706b\u5899\u8fde\u63a5\u89c4\u5219<\/p>\n<p>1.\u5b89\u88c5firewalld yum -y install firewalld<\/p>\n<p>CentOS7 firewalld\u9632\u706b\u5899 \u5e38\u7528\u547d\u4ee4<br \/>\n1\u3001firewalld\u7684\u57fa\u672c\u4f7f\u7528<br \/>\n\u542f\u52a8\uff1a systemctl start firewalld<br \/>\n\u91cd\u542f\uff1asystemctl restart firewalld<br \/>\n\u5173\u95ed\uff1a systemctl stop firewalld<br \/>\n\u67e5\u770b\u72b6\u6001\uff1a systemctl status firewalld<br \/>\n\u5f00\u673a\u7981\u7528 \uff1a systemctl disable firewalld<br \/>\n\u5f00\u673a\u542f\u7528 \uff1a systemctl enable firewalld<\/p>\n<p>firewalld-cmd \u914d\u7f6e\u547d\u4ee4<br \/>\n2.\u914d\u7f6efirewalld-cmd<br \/>\n\u67e5\u770b\u7248\u672c\uff1a firewall-cmd \u2013version<br \/>\n\u67e5\u770b\u5e2e\u52a9\uff1a firewall-cmd \u2013help<br \/>\n\u663e\u793a\u72b6\u6001\uff1a firewall-cmd \u2013state<br \/>\n\u67e5\u770b\u6240\u6709\u6253\u5f00\u7684\u7aef\u53e3\uff1a firewall-cmd \u2013zone=public \u2013list-ports<br \/>\n\u66f4\u65b0\u9632\u706b\u5899\u89c4\u5219\uff1a firewall-cmd \u2013reload<br \/>\n\u67e5\u770b\u533a\u57df\u4fe1\u606f: firewall-cmd \u2013get-active-zones<br \/>\n\u67e5\u770b\u6307\u5b9a\u63a5\u53e3\u6240\u5c5e\u533a\u57df\uff1a firewall-cmd \u2013get-zone-of-interface=eth0<br \/>\n\u62d2\u7edd\u6240\u6709\u5305\uff1afirewall-cmd \u2013panic-on<br \/>\n\u53d6\u6d88\u62d2\u7edd\u72b6\u6001\uff1a firewall-cmd \u2013panic-off<br \/>\n\u67e5\u770b\u662f\u5426\u62d2\u7edd\uff1a firewall-cmd \u2013query-panic<\/p>\n<p>\u542f\u52a8\u4e00\u4e2a\u670d\u52a1\uff1asystemctl start firewalld.service<br \/>\n\u5173\u95ed\u4e00\u4e2a\u670d\u52a1\uff1asystemctl stop firewalld.service<br \/>\n\u91cd\u542f\u4e00\u4e2a\u670d\u52a1\uff1asystemctl restart firewalld.service<br \/>\n\u663e\u793a\u4e00\u4e2a\u670d\u52a1\u7684\u72b6\u6001\uff1asystemctl status firewalld.servicec<br \/>\n\u5728\u5f00\u673a\u65f6\u542f\u7528\u4e00\u4e2a\u670d\u52a1\uff1asystemctl enable firewalld.service<br \/>\n\u5728\u5f00\u673a\u65f6\u7981\u7528\u4e00\u4e2a\u670d\u52a1\uff1asystemctl disable firewalld.service<br \/>\n\u67e5\u770b\u670d\u52a1\u662f\u5426\u5f00\u673a\u542f\u52a8\uff1asystemctl is-enabled firewalld.service<br \/>\n\u67e5\u770b\u5df2\u542f\u52a8\u7684\u670d\u52a1\u5217\u8868\uff1asystemctl list-unit-files|grep enabled<br \/>\n\u67e5\u770b\u542f\u52a8\u5931\u8d25\u7684\u670d\u52a1\u5217\u8868\uff1asystemctl \u2013failed<\/p>\n<p>centos7\u7248\u672c<br \/>\ncentos7\u7248\u672c\u5bf9\u9632\u706b\u5899\u8fdb\u884c\u52a0\u5f3a,\u4e0d\u518d\u4f7f\u7528\u539f\u6765\u7684iptables,\u542f\u7528firewalld,<br \/>\n\u4e0d\u8fc7\u56fd\u5916\u6709\u4e9bVPS\u670d\u52a1\u5668\u5f00\u542f\u4e5f\u662f\u7528iptables\uff0c\u4f7f\u7528\u65f6\u53ef\u4ee5\u5148\u68c0\u6d4b\u4e00\u4e0b\u5f00\u542f\u7684\u662f\u54ea\u4e00\u79cd\u9632\u706b\u5899\u3002<\/p>\n<p>firewalld\u9632\u706b\u5899\u8bbe\u7f6e<br \/>\nCentOS7\/RHEL7\u7cfb\u7edf\u9ed8\u8ba4\u7684iptables\u7ba1\u7406\u5de5\u5177\u662ffirewalld,\u4e0d\u518d\u662f\u4ee5\u5f80\u7684iptables-services,\u547d\u4ee4\u7528\u8d77\u6765\u4e5f\u662f\u4e0d\u4e00\u6837\u4e86,<br \/>\n\u5f53\u7136\u4f60\u4e5f\u53ef\u4ee5\u9009\u62e9\u5378\u8f7dfirewalld,\u5b89\u88c5iptables-services firewalld \u670d\u52a1\u7ba1\u7406<\/p>\n<p>\u5f00\u542f\u7aef\u53e3<br \/>\nfirewall-cmd \u2013zone=public \u2013add-port=80\/tcp \u2013permanent<br \/>\nfirewall-cmd &#8211;zone=public &#8211;add-port=1723\/tcp &#8211;permanent<br \/>\nfirewall-cmd \u2013zone=public \u2013add-port=22\/tcp \u2013permanent<br \/>\nfirewall-cmd \u2013zone=public \u2013add-port=47\/tcp \u2013permanent<br \/>\n\u79fb\u9664\u7aef\u53e3<br \/>\nfirewall-cmd \u2013zone=public \u2013remove-port=80\/tcp \u2013permanent<br \/>\nfirewall-cmd \u2013zone=public \u2013remove-port=22\/tcp \u2013permanent<br \/>\nfirewall-cmd \u2013zone=public \u2013remove-port=47\/tcp \u2013permanent<\/p>\n<p>\u5f00\u653e\u7aef\u53e3<br \/>\nfirewall-cmd \u2013zone=public \u2013add-port=5672\/tcp \u2013permanent # \u5f00\u653e5672\u7aef\u53e3<br \/>\nfirewall-cmd \u2013zone=public \u2013remove-port=5672\/tcp \u2013permanent #\u5173\u95ed5672\u7aef\u53e3<br \/>\nfirewall-cmd \u2013reload # \u914d\u7f6e\u7acb\u5373\u751f\u6548<\/p>\n<p>\u914d\u7f6e\u9632\u706b\u5899\uff0c\u5f00\u542f\u6570\u636e\u8def\u7531\uff08\u5173\u952e\u7684\u4e00\u6b65\uff0c\u4e0d\u914d\u7f6e\u9632\u706b\u5899\uff0c\u65e0\u6cd5\u5b9e\u73b0\u7f51\u7edc\u8bbf\u95ee\uff09<br \/>\nfirewall-cmd \u2013permanent \u2013direct \u2013add-rule ipv4 filter INPUT 0 -i eth0 -p tcp \u2013dport 1723 -j ACCEPT<br \/>\nfirewall-cmd \u2013permanent &#8211;direct &#8211;add-rule ipv4 filter INPUT 0 -p gre -j ACCEPT<br \/>\nfirewall-cmd \u2013permanent \u2013direct \u2013add-rule ipv4 filter POSTROUTING 0 -t nat -o eth0 -j MASQUERADE<br \/>\nfirewall-cmd \u2013permanent \u2013direct \u2013add-rule ipv4 filter FORWARD 0 -i ppp+ -o eth0 -j ACCEPT<br \/>\nfirewall-cmd \u2013permanent \u2013direct \u2013add-rule ipv4 filter FORWARD 0 -i eth0 -o ppp+ -j ACCEPT<br \/>\n\u8bbe\u7f6e\u5b8c\u91cd\u542f\u9632\u706b\u5899<br \/>\nsystemctl restart firewalld<\/p>\n<p>\u53c2\u8003\u89c4\u5219<br \/>\nfirewall-cmd \u2013permanent \u2013direct \u2013passthrough ipv4 -t nat -I POSTROUTING -o eth0 -j MASQUERADE -s 172.30.229.0\/24<\/p>\n<p>\u7aef\u53e3\u7684\u589e\u3001\u5220\u3001\u67e5\uff08\u4ee580\u7aef\u53e3\u4e3a\u4f8b\uff09<br \/>\n\u6dfb\u52a0<br \/>\nfirewall-cmd \u2013zone=public \u2013add-port=80\/tcp \u2013permanent \uff08\u2013permanent\u6c38\u4e45\u751f\u6548\uff0c\u6ca1\u6709\u6b64\u53c2\u6570\u91cd\u542f\u540e\u5931\u6548\uff09<br \/>\n\u5220\u9664<br \/>\nfirewall-cmd \u2013zone= public \u2013remove-port=80\/tcp \u2013permanent<br \/>\n\u91cd\u65b0\u8f7d\u5165<br \/>\nfirewall-cmd \u2013reload<br \/>\n\u67e5\u770b<br \/>\nfirewall-cmd \u2013zone= public \u2013query-port=80\/tcp<\/p>\n<p>\u5220\u9664\u4e4b\u524d\u8bbe\u7f6e\u7684\u8f6c\u53d1\u89c4\u5219\uff0c\u628a\u4ee5\u4e0a\u547d\u4ee4\u4e2d\u7684\u2013add-forward-port\u6539\u4e3a\u2013remove-forward-port\u8fd0\u884c\u4e00\u6b21\u5373\u53ef\u3002<br \/>\n\u5982\u679c\u8981\u4f7f\u8f6c\u53d1\u89c4\u5219\u6c38\u4e45\u6709\u6548\uff0c\u8981\u5728\u547d\u4ee4\u6700\u540e\u9762\u52a0\u4e0a\u2013permanent\u53c2\u6570\u3002<\/p>\n<p>firewall-cmd \u2013reload ##\u91cd\u542f\u9632\u706b\u5899(\u6b64\u547d\u4ee4\u5982\u679c\u51fa\u9519\u53ef\u4ee5\u7528systemctl restart firewalld\u91cd\u542f)<\/p>\n<p>firewall-cmd \u2013zone=public \u2013add-port=8080\/tcp \u2013permanent ##\u5f00\u653e\u6307\u5b9a\u7aef\u53e3\uff08\u6b64\u5904\u4e3a\u5f00\u653e8080\uff0c\u53ef\u66ff\u6362\u4e3a\u6307\u5b9a\u7aef\u53e3\u53f7\uff09\uff0c\u5f00\u653e\u540e\u9700\u91cd\u542f\u9632\u706b\u5899\u751f\u6548<br \/>\nfirewall-cmd \u2013zone=public \u2013remove-port=8080\/tcp \u2013permanent ##\u5173\u95ed\u6307\u5b9a\u7aef\u53e3\uff08\u6b64\u5904\u4e3a\u5173\u95ed8080\uff0c\u53ef\u66ff\u6362\u4e3a\u6307\u5b9a\u7aef\u53e3\u53f7\uff09<\/p>\n<p>\u67e5\u770b\u9632\u706b\u5899\u6240\u6709\u5f00\u653e\u7684\u7aef\u53e3<br \/>\nfirewall-cmd \u2013list-ports #\u67e5\u770b\u5f00\u653e\u7684\u7aef\u53e3<\/p>\n<p>\u67e5\u770b\u6240\u6709\u6253\u5f00\u7684\u7aef\u53e3\uff1a firewall-cmd \u2013zone=public \u2013list-ports<br \/>\n\u66f4\u65b0\u9632\u706b\u5899\u89c4\u5219\uff1a firewall-cmd \u2013reload<br \/>\n\u67e5\u770b\u533a\u57df\u4fe1\u606f: firewall-cmd \u2013get-active-zones<br \/>\n\u67e5\u770b\u6307\u5b9a\u63a5\u53e3\u6240\u5c5e\u533a\u57df\uff1a firewall-cmd \u2013get-zone-of-interface=eth0<br \/>\n\u62d2\u7edd\u6240\u6709\u5305\uff1afirewall-cmd \u2013panic-on<br \/>\n\u53d6\u6d88\u62d2\u7edd\u72b6\u6001\uff1a firewall-cmd \u2013panic-off<br \/>\n\u67e5\u770b\u662f\u5426\u62d2\u7edd\uff1a firewall-cmd \u2013query-panic<\/p>\n<p>\u914d\u7f6e\u670d\u52a1\u5668\u63d0\u4f9b\u5546\u4e3b\u673a\u7684\u5b89\u5168\u7b56\u7565\uff0c\u5982\u679c\u4f7f\u7528\u7684\u662f\u963f\u91cc\u4e91\u7684ECS\uff0c\u9700\u8981\u914d\u7f6e\u76f8\u5173\u7684\u5b89\u5168\u7b56\u7565\uff0c\u5176\u4ed6\u670d\u52a1\u5546\u8bf7\u81ea\u884c\u68c0\u67e5<br \/>\n\u5f00\u542fTCP\u76841723\u7aef\u53e3<br \/>\n\u5f00\u542fGRE\u534f\u8bae<\/p>\n","protected":false},"excerpt":{"rendered":"<p>firewalld\u9632\u706b\u5899\u547d\u4ee4 \u4f7f\u7528Firewalld\u5de5\u5177\u6765\u7ba1\u7406Lin&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/posts\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":1,"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/posts\/18\/revisions"}],"predecessor-version":[{"id":19,"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/posts\/18\/revisions\/19"}],"wp:attachment":[{"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/media?parent=18"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/categories?post=18"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.xyblogs.com\/index.php\/wp-json\/wp\/v2\/tags?post=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}