On Sat, Aug 08, 2020 at 08:40:11AM -0000, Jason Long wrote:
Hello,
I want to conver below iptables to the Firewalld rules and I'm thankful if anyone
help me:
A lot of what your have below already exists in firewalld either through
the default rule set or by adding services/ports/etc. See inline for
details.
[code]
# Allow all loopback (lo0) traffic and drop all traffic to 127/8 that doesn't use
lo0
-A INPUT -i lo -j ACCEPT
Already present in the default rule set. No action needed.
-A INPUT -d 127.0.0.0/8 -j REJECT
Not explicit, but it be handled by catch all reject in the INPUT chain.
# Accept all established inbound connections
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
Already present in the default rule set. No action needed.
# Allow all outbound traffic - you can modify this to only allow
certain traffic
-A OUTPUT -j ACCEPT
Already present in the default rule set. No action needed.
# Allow HTTP and HTTPS connections from anywhere (the normal ports
for websites and SSL).
-A INPUT -p tcp --dport 80 -j ACCEPT
-A INPUT -p tcp --dport 443 -j ACCEPT
# firewall-cmd --add-service http
# firewall-cmd --add-service https
# Allow SSH connections
#
# The -dport number should be the same port number you set in sshd_config
#
-A INPUT -p tcp -m state --state NEW --dport 22 -j ACCEPT
# firewall-cmd --add-service ssh
# Allow ping
-A INPUT -p icmp -j ACCEPT
Already present in the default zone (public) or any other zone that uses
--set-target=default or --set-target=ACCEPT.
# Log iptables denied calls
-A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables denied: "
--log-level 7
# firewall-cmd --set-log-denied=all
# Drop all other inbound - default deny unless explicitly allowed
policy
-A INPUT -j DROP
-A FORWARD -j DROP
Already present in the default rule set. No action needed.