Difference between revisions of "Firewall Management in Linux"
From Observer GigaFlow Support | VIAVI Solutions Inc.
Kevin Wilkie (Talk | contribs) |
Kevin Wilkie (Talk | contribs) |
||
Line 19: | Line 19: | ||
iptables -A INPUT -j REJECT --reject-with icmp-host-prohibited | iptables -A INPUT -j REJECT --reject-with icmp-host-prohibited | ||
/etc/init.d/iptables save | /etc/init.d/iptables save | ||
+ | |||
+ | For firewalld | ||
+ | firewall-cmd --zone=public --permanent --add-port=5000/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=161/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=162/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=1812/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=1813/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=2055/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=53/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=514/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=1645/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=2050:2060/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=510-520/udp | ||
+ | firewall-cmd --zone=public --permanent --add-port=22/tcp | ||
+ | firewall-cmd --zone=public --permanent --add-port=54321-54330/tcp | ||
+ | firewall-cmd --zone=public --permanent --add-port=5432/tcp | ||
+ | firewall-cmd --zone=public --permanent --add-port=7902/tcp | ||
+ | firewall-cmd --zone=public --permanent --add-port=8902/tcp | ||
+ | firewall-cmd --reload |
Revision as of 11:52, 9 April 2018
Iptables
iptables -A INPUT -p udp --dport 161 -j ACCEPT iptables -A INPUT -p udp --dport 162 -j ACCEPT iptables -A INPUT -p udp --dport 1812 -j ACCEPT iptables -A INPUT -p udp --dport 1813 -j ACCEPT iptables -A INPUT -p udp --dport 2055 -j ACCEPT iptables -A INPUT -p udp --dport 53 -j ACCEPT iptables -A INPUT -p udp --dport 514 -j ACCEPT iptables -A INPUT -p udp --dport 1645 -j ACCEPT iptables -A INPUT -p udp --dport 2050:2060 -j ACCEPT iptables -A INPUT -p udp --dport 510:520 -j ACCEPT iptables -A INPUT -p tcp --dport 22 -j ACCEPT iptables -A INPUT -p tcp --dport 54321:54330 -j ACCEPT iptables -A INPUT -p tcp --dport 5432 -j ACCEPT iptables -A INPUT -p tcp --dport 7902 -j ACCEPT iptables -A INPUT -p tcp --dport 8902 -j ACCEPT iptables -D INPUT -j REJECT --reject-with icmp-host-prohibited /etc/init.d/iptables save iptables -A INPUT -j REJECT --reject-with icmp-host-prohibited /etc/init.d/iptables save
For firewalld
firewall-cmd --zone=public --permanent --add-port=5000/udp firewall-cmd --zone=public --permanent --add-port=161/udp firewall-cmd --zone=public --permanent --add-port=162/udp firewall-cmd --zone=public --permanent --add-port=1812/udp firewall-cmd --zone=public --permanent --add-port=1813/udp firewall-cmd --zone=public --permanent --add-port=2055/udp firewall-cmd --zone=public --permanent --add-port=53/udp firewall-cmd --zone=public --permanent --add-port=514/udp firewall-cmd --zone=public --permanent --add-port=1645/udp firewall-cmd --zone=public --permanent --add-port=2050:2060/udp firewall-cmd --zone=public --permanent --add-port=510-520/udp firewall-cmd --zone=public --permanent --add-port=22/tcp firewall-cmd --zone=public --permanent --add-port=54321-54330/tcp firewall-cmd --zone=public --permanent --add-port=5432/tcp firewall-cmd --zone=public --permanent --add-port=7902/tcp firewall-cmd --zone=public --permanent --add-port=8902/tcp firewall-cmd --reload