//1.查看防火墙状态
[root@localhost ~]# systemctl status firewalld.service
//2.设置防火墙开机启动
[root@localhost ~]# systemctl enable firewalld.service
//3.启动防火墙
[root@localhost ~]# systemctl start firewalld.service
[root@localhost ~]# systemctl start firewalld.service
//4.允许80范围的
tcp 端口至 public 级别,并永久生效
[root@localhost ~]# firewall-cmd --zone=public --add-port=80/tcp --permanent
[root@localhost ~]# firewall-cmd --zone=public --add-port=5050-5060/udp --permanent
success
success
//5.重新加载防火墙服务,不用重启防火墙服务生效,每次添加规则都要执行,才能立刻生效。
[root@localhost ~]# firewall-cmd --reload
success
success
//6.允许http服务进行访问
[root@localhost ~]# firewall-cmd --zone=public --add-service=http --permanent
success
success
//7.端口转发,先执行这才命令
[root@localhost ~]# firewall-cmd --zone=external --add-masquerade
success
success
//8.将888端口转发到22端口
[root@localhost ~]# firewall-cmd --permanent --zone=public --add-forward-port=port=888:proto=tcp:toport=22
success
success
//9.查询当前区域
[root@localhost ~]# firewall-cmd --get-default-zone
public
public
//10.查询网卡所在区域
[root@localhost ~]# firewall-cmd --get-zone-of-interface=ens32
public
[root@localhost ~]# firewall-cmd --get-zone-of-interface=ens32
public
//11.查询ssh服务是否允许运行
[root@localhost ~]# firewall-cmd --zone=public --query-service=ssh
yes
[root@localhost ~]# firewall-cmd --zone=public --query-service=ssh
yes
//12.设置默认规则为DMZ区域
[root@localhost ~]# firewall-cmd --set-default-zone=dmz
success
[root@localhost ~]# firewall-cmd --set-default-zone=dmz
success
//13.取消80端口
[root@localhost ~]# firewall-cmd --zone=public --remove-port=80/tcp
success
success
//14.取消http服务
[root@localhost ~]# firewall-cmd --zone=public --remove-service=http
success
success
//15、列出所有开启的服务
[root@localhost ~]# firewall-cmd --get-services
//16、列出支持区域列表
[root@localhost ~]# firewall-cmd --get-zones
//17.列出活动区域
[root@localhost ~]# firewall-cmd --get-active-zones
dmz
interfaces: ens32
dmz
interfaces: ens32
//18.列出所有permanent设置
[root@localhost ~]# firewall-cmd --permanent --list-all
dmz
target: default
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
masquerade: no
forward-ports:
sourceports:
icmp-blocks:
rich rules:
dmz
target: default
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
masquerade: no
forward-ports:
sourceports:
icmp-blocks:
rich rules: