Commandes pour les zones
firewall-cmd --get-zones
firewall-cmd --get-default-zone
firewall-cmd --list-all-zones
firewall-cmd --set-default-zone=internal
firewall-cmd --get-zone-of-interface=enp0s3
firewall-cmd --get-services
/usr/lib/firewalld/services/
cd /etc/firewalld/services/
cp /usr/lib/firewalld/services/ssh.xml /etc/firewalld/services/
cd /etc/firewalld/services/
vim ssh.xml
firewall-cmd --reload
firewall-cmd --state
firewall-cmd --get-active-zones
firewall-cmd –zone=public --add-service=rtmp
firewall-cmd --zone=public --remove-service=rtmp
firewall-cmd --add-service=rtmp --permanent
firewall-cmd --reload
firewall-cmd --permanent --add-source=192.168.0.0/24
firewall-cmd --permanent --add-port=1935/tcp
firewall-cmd --reload
firewall-cmd --list-all
firewall-cmd --add-rich-rule 'rule family="ipv4" source \ address="192.168.0.0/24" service name="http" accept'
firewall-cmd --add-rich-rule 'rule family="ipv4" source \ address="192.168.0.0/24" service name="http" accept' –permanent
firewall-cmd --reload
firewall-cmd --list-all
firewall-cmd --panic-on
firewall-cmd --panic-off
firewall-cmd --zone=external --query-masquerade
firewall-cmd --zone=external --add-masquerade
firewall-cmd --zone=external --add-forward-port=port=22:proto=tcp:toport=2222:toaddr=192.168.0.132
firewall-cmd --get-icmptypes
firewall-cmd --zone=public --query-icmp-block=echo-reply
firewall-cmd --zone=public --add-icmp-block=echo-reply
firewall-cmd --direct --get-rules ipv4 filter IN_public_allow
firewall-cmd --direct --add-rule ipv4 filter IN_public_allow 0 -m tcp -p tcp --dport 25 -j ACCEPT
firewall-cmd --direct --remove-rule ipv4 filter IN_public_allow 0 -m tcp -p tcp --dport 25 -j ACCEPT
vim /etc/firewalld/firewalld.conf
Lockdown=yes
firewall-cmd --lockdown-on
firewall-cmd --lockdown-off
firewall-cmd --zone=public --add-rich-rule='rule family="ipv4" source address="192.168.0.254" accept'
firewall-cmd --zone=public --add-rich-rule='rule family="ipv4" source address="192.168.0.250" reject'
firewall-cmd --zone=public --list-all