firewalld.zones man page on Oracle

Man page or keyword search:  
man Server   33470 pages
apropos Keyword Search (all sections)
Output format
Oracle logo
[printable version]

FIREWALLD.ZONES(5)		firewalld.zones		    FIREWALLD.ZONES(5)

NAME
       firewalld.zones - firewalld zones

DESCRIPTION
   What is a zone?
       A network zone defines the level of trust for network connections. This
       is a one to many relation, which means that a connection can only be
       part of one zone, but a zone can be used for many network connections.

       The zone defines the firewall features that are enabled in this zone:

       Predefined services
	   A service is a combination of port and/or protocol entries.
	   Optionally netfilter helper modules can be added and also a IPv4
	   and IPv6 destination address.

       Ports and protocols
	   Definition of tcp or udp ports, where ports can be a single port or
	   a port range.

       ICMP blocks
	   Blocks selected Internet Control Message Protocol (ICMP) messages.
	   These messages are either information requests or created as a
	   reply to information requests or in error conditions.

       Masquerading
	   The addresses of a private network are mapped to and hidden behind
	   a public IP address. This is a form of address translation.

       Forward ports
	   A forward port is either mapped to the same port on another host or
	   to another port on the same host or to another port on another
	   host.

       Rich language rules
	   The rich language extends the elements (service, port, icmp-block,
	   masquerade and forward-port) with additional source and destination
	   addresses, logging, actions and limits for logs and actions. It can
	   also be used for host or network white and black listing (for more
	   information, please have a look at firewalld.richlanguage(5)).

       For more information on the zone file format, please have a look at
       firewalld.zone(5).

   Which zones are available?
       Here are the zones provided by firewalld sorted according to the
       default trust level of the zones from untrusted to trusted:

       drop
	   Any incoming network packets are dropped, there is no reply. Only
	   outgoing network connections are possible.

       block
	   Any incoming network connections are rejected with an
	   icmp-host-prohibited message for IPv4 and icmp6-adm-prohibited for
	   IPv6. Only network connections initiated within this system are
	   possible.

       public
	   For use in public areas. You do not trust the other computers on
	   networks to not harm your computer. Only selected incoming
	   connections are accepted.

       external
	   For use on external networks with masquerading enabled especially
	   for routers. You do not trust the other computers on networks to
	   not harm your computer. Only selected incoming connections are
	   accepted.

       dmz
	   For computers in your demilitarized zone that are
	   publicly-accessible with limited access to your internal network.
	   Only selected incoming connections are accepted.

       work
	   For use in work areas. You mostly trust the other computers on
	   networks to not harm your computer. Only selected incoming
	   connections are accepted.

       home
	   For use in home areas. You mostly trust the other computers on
	   networks to not harm your computer. Only selected incoming
	   connections are accepted.

       internal
	   For use on internal networks. You mostly trust the other computers
	   on the networks to not harm your computer. Only selected incoming
	   connections are accepted.

       trusted
	   All network connections are accepted.

   Which zone should be used?
       A public WIFI network connection for example should be mainly
       untrusted, a wired home network connection should be fairly trusted.
       Select the zone that best matches the network you are using.

   How to configure or add zones?
       To configure or add zones you can either use one of the firewalld
       interfaces to handle and change the configuration: These are the
       graphical configuration tool firewall-config, the command line tool
       firewall-cmd or the D-BUS interface. Or you can create or copy a zone
       file in one of the configuration directories.  /usr/lib/firewalld/zones
       is used for default and fallback configurations and
       /etc/firewalld/zones is used for user created and customized
       configuration files.

   How to set or change a zone for a connection?
       The zone is stored into the ifcfg of the connection with ZONE=option.
       If the option is missing or empty, the default zone set in firewalld is
       used.

       If the connection is controlled by NetworkManager, you can also use
       nm-connection-editor to change the zone.

SEE ALSO
       firewall-applet(1), firewalld(1), firewall-cmd(1), firewall-config(1),
       firewalld.conf(5), firewalld.direct(5), firewalld.icmptype(5),
       firewalld.lockdown-whitelist(5), firewall-offline-cmd(1),
       firewalld.richlanguage(5), firewalld.service(5), firewalld.zone(5),
       firewalld.zones(5)

NOTES
       firewalld home page at fedorahosted.org:
	   http://fedorahosted.org/firewalld/

       More documentation with examples:
	   http://fedoraproject.org/wiki/FirewallD

AUTHORS
       Thomas Woerner <twoerner@redhat.com>
	   Developer

       Jiri Popelka <jpopelka@redhat.com>
	   Developer

firewalld 0.3.9						    FIREWALLD.ZONES(5)
[top]

List of man pages available for Oracle

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net