firewalld的练习

题目

练习题:
1默认public区域对外开放所有人能通过ssh服务连接,但拒绝192.168.200.0/24网段通过ssh
连接服务器。
2.使Firewalld允许所有人能访问http,nginx服务,但职有192.168.100.10主机可以访问ssh服
务。
3.当用户来源IP地址是192.168.100.20主机,则将用户请求的5555端口转发至后端
4.将tcp协议端口3300- 3400添加到external区域。
5.查询internal区域中是否包含接口ens33。
6.为internal区域删除绑定的网络接口ens33。
7.查询internal区域中是否启用了SSH服务。
8.为internal区域设置允许访问SSH服务。

解答

1、默认public区域对外开放所有人能通过ssh服务连接,但拒绝192.168.200.0/24网段通过ssh
连接服务器。

[root@web-server1 ~]# firewall-cmd --add-rich-rule='rule family=ipv4 source address=192.168.200.0/24 port port=22 protocol=tcp drop'
success
[root@web-server1 ~]# firewall-cmd --list-all
public (active)
  target: default
  icmp-block-inversion: no
  interfaces: ens33
  sources: 
  services: ssh dhcpv6-client
  ports: 
  protocols: 
  masquerade: no
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 
	rule family="ipv4" source address="192.168.200.0/24" port port="22" protocol="tcp" drop

2.使Firewalld允许所有人能访问http,nginx服务,但职有192.168.100.10主机可以访问ssh服
务。

[root@web-server1 ~]#  firewall-cmd --add-service={http,nginx}
Warning: INVALID_SERVICE: nginx
success
[root@web-server1 ~]# firewall-cmd --add-rich-rule='rule family=ipv4 source address=192.168.100.10 port port=22 protocol=tcp accept'
success
[root@web-server1 ~]# firewall-cmd --list-all
public (active)
  target: default
  icmp-block-inversion: no
  interfaces: ens33
  sources: 
  services: ssh dhcpv6-client http
  ports: 
  protocols: 
  masquerade: no
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 
	rule family="ipv4" source address="192.168.200.0/24" port port="22" protocol="tcp" drop
	rule family="ipv4" source address="192.168.100.10" port port="22" protocol="tcp" accept

3.当用户来源IP地址是192.168.100.20主机,则将用户请求的5555端口转发至后端192.168.100.10的22端口。

[root@web-server1 ~]# firewall-cmd --add-masquerade
success
[root@web-server1 ~]# firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.100.20" forward-port port="5555" protocol="tcp" to-port="22" to-addr="192.168.100.10"'
success
[root@web-server1 ~]# firewall-cmd --list-all
public (active)
  target: default
  icmp-block-inversion: no
  interfaces: ens33
  sources: 
  services: ssh dhcpv6-client http
  ports: 
  protocols: 
  masquerade: yes
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 
	rule family="ipv4" source address="192.168.200.0/24" port port="22" protocol="tcp" drop
	rule family="ipv4" source address="192.168.100.10" port port="22" protocol="tcp" accept
	rule family="ipv4" source address="192.168.100.20" forward-port port="5555" protocol="tcp" to-port="22" to-addr="192.168.100.10"

4.将tcp协议端口3300- 3400添加到external区域。

[root@web-server1 ~]# firewall-cmd --zone=external  --add-port=3300-3400/tcp
success
[root@web-server1 ~]# firewall-cmd --zone=external --list-all
external
  target: default
  icmp-block-inversion: no
  interfaces: 
  sources: 
  services: ssh
  ports: 3300-3400/tcp
  protocols: 
  masquerade: yes
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 

5.查询internal区域中是否包含接口ens33。

[root@web-server1 ~]# firewall-cmd --zone=internal --query-interface=ens33
no

6.为internal区域删除绑定的网络接口ens33。

[root@web-server1 ~]# firewall-cmd --zone=internal --remove-interface=ens33
The interface is under control of NetworkManager and already bound to the default zone
The interface is under control of NetworkManager, setting zone to default.
success

7.查询internal区域中是否启用了SSH服务。

[root@web-server1 ~]# firewall-cmd --zone=internal --query-service=ssh
yes

8.为internal区域设置允许访问SSH服务。

[root@web-server1 ~]# firewall-cmd --zone=internal --add-service=ssh
Warning: ALREADY_ENABLED: 'ssh' already in 'internal'
success
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值