<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>firewall on IT Quicktasks</title><link>https://quicktasks.ismael.casimpan.com/tags/firewall/</link><description>Recent content in firewall on IT Quicktasks</description><generator>Hugo -- gohugo.io</generator><copyright>Copyright © 2018–2022, Ismael Casimpan Jr.; All Rights Reserved</copyright><lastBuildDate>Sat, 28 Sep 2019 00:20:25 +0800</lastBuildDate><atom:link href="https://quicktasks.ismael.casimpan.com/tags/firewall/index.xml" rel="self" type="application/rss+xml"/><item><title>FirewallD Reading Materials</title><link>https://quicktasks.ismael.casimpan.com/post/firewalld-reading-materials/</link><pubDate>Sat, 28 Sep 2019 00:20:25 +0800</pubDate><guid>https://quicktasks.ismael.casimpan.com/post/firewalld-reading-materials/</guid><description>
https://www.certdepot.net/rhel7-get-started-firewalld/ https://www.linuxjournal.com/content/understanding-firewalld-multi-zone-configurations https://computingforgeeks.com/install-and-use-firewalld-on-ubuntu-18-04-ubuntu-16-04/</description></item><item><title>iptables: Allow Specific IP to Connect via SSH.</title><link>https://quicktasks.ismael.casimpan.com/post/iptables-allow-specific-ip-to-ssh/</link><pubDate>Sat, 28 Sep 2019 00:20:25 +0800</pubDate><guid>https://quicktasks.ismael.casimpan.com/post/iptables-allow-specific-ip-to-ssh/</guid><description>
1iptables -A INPUT -p tcp -s 114.191.33.88 --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT 2iptables -A OUTPUT -p tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT</description></item><item><title>Specific IP Connection to SSH Using Firewalld Rich Rules</title><link>https://quicktasks.ismael.casimpan.com/post/specific-ip-connection-to-ssh-using-firewalld-rich-rules/</link><pubDate>Sat, 28 Sep 2019 00:20:25 +0800</pubDate><guid>https://quicktasks.ismael.casimpan.com/post/specific-ip-connection-to-ssh-using-firewalld-rich-rules/</guid><description>
1sudo firewall-cmd --add-rich-rule &amp;#39;rule family=&amp;#34;ipv4&amp;#34; source address=&amp;#34;192.168.10.9&amp;#34; service name=&amp;#34;ssh&amp;#34; accept&amp;#39; --permanent 2sudo firewall-cmd --remove-service ssh --permanent ## needed, otherwise ssh will still be allowed for all 3sudo systemctl reload firewalld See details in https://access.redhat.com/discussions/1342573</description></item><item><title>ufw Reading Materials</title><link>https://quicktasks.ismael.casimpan.com/post/ufw-reading-materials/</link><pubDate>Sat, 28 Sep 2019 00:20:25 +0800</pubDate><guid>https://quicktasks.ismael.casimpan.com/post/ufw-reading-materials/</guid><description>
https://www.linux.com/learn/introduction-uncomplicated-firewall-ufw</description></item><item><title>ufw: List Rules in Ubuntu Machine</title><link>https://quicktasks.ismael.casimpan.com/post/ufw-list-rules-in-ubuntu-machine/</link><pubDate>Sat, 21 Sep 2019 00:20:25 +0800</pubDate><guid>https://quicktasks.ismael.casimpan.com/post/ufw-list-rules-in-ubuntu-machine/</guid><description>
1root@xxx:/var/log# ufw status 2Status: active 34To Action From 5-- ------ ---- 622 LIMIT Anywhere 780 ALLOW Anywhere 8443 ALLOW Anywhere 9??41908/tcp ALLOW Anywhere 10Anywhere ALLOW 115.85.11.98 1125/tcp ALLOW Anywhere 124444/tcp ALLOW Anywhere 134444/udp ALLOW Anywhere 1422 (v6) LIMIT Anywhere (v6) 1580 (v6) ALLOW Anywhere (v6) 16443 (v6) ALLOW Anywhere (v6) 1741908/tcp (v6) ALLOW Anywhere (v6) 1825/tcp (v6) ALLOW Anywhere (v6) 194444/tcp (v6) ALLOW Anywhere (v6) 204444/udp (v6) ALLOW Anywhere (v6)</description></item></channel></rss>