<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="https://purl.org/dc/elements/1.1/" xmlns:content="https://purl.org/rss/1.0/modules/content/" xmlns:foaf="https://xmlns.com/foaf/0.1/" xmlns:og="https://ogp.me/ns#" xmlns:rdfs="https://www.w3.org/2000/01/rdf-schema#" xmlns:schema="https://schema.org/" xmlns:sioc="https://rdfs.org/sioc/ns#" xmlns:sioct="https://rdfs.org/sioc/types#" xmlns:skos="https://www.w3.org/2004/02/skos/core#" xmlns:xsd="https://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/tag/firewalls">
  <channel>
    <title>Firewalls</title>
    <link>https://www.linuxjournal.com/tag/firewalls</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Understanding Firewalld in Multi-Zone Configurations</title>
  <link>https://www.linuxjournal.com/content/understanding-firewalld-multi-zone-configurations</link>
  <description>  &lt;div data-history-node-id="1339272" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/firewall-29503_640.png" width="500" height="493" alt="""" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/nathan-vance-0" lang="" about="https://www.linuxjournal.com/users/nathan-vance-0" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Nathan Vance&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Stories of compromised servers and data theft fill today's news. It
isn't difficult for someone who has read an informative blog post to
access a system via a misconfigured service, take advantage of a recently
exposed vulnerability or gain control using a stolen password. Any of
the many internet services found on a typical Linux server could harbor
a vulnerability that grants unauthorized access to the system.
&lt;/p&gt;

&lt;p&gt;
Since it's an impossible task to harden a system at the application level
against every possible threat, firewalls provide security by limiting
access to a system. Firewalls filter incoming packets based on their
IP of origin, their destination port and their protocol. This way,
only a few IP/port/protocol combinations interact with the system,
and the rest do not.
&lt;/p&gt;

&lt;p&gt;
Linux firewalls are handled by netfilter, which is a kernel-level
framework. For more than a decade, iptables has provided the userland
abstraction layer for netfilter. iptables subjects packets to a gauntlet
of rules, and if the IP/port/protocol combination of the rule matches
the packet, the rule is applied causing the packet to be accepted,
rejected or dropped.
&lt;/p&gt;

&lt;p&gt;
Firewalld is a newer userland abstraction layer for
netfilter. Unfortunately, its power and flexibility are underappreciated
due to a lack of documentation describing multi-zoned configurations. This
article provides examples to remedy this situation.
&lt;/p&gt;

&lt;h3&gt;
Firewalld Design Goals&lt;/h3&gt;

&lt;p&gt;
The designers of firewalld realized that most iptables usage cases involve
only a few unique IP sources, for each of which a whitelist of services
is allowed and the rest are denied. To take advantage of this pattern,
firewalld categorizes incoming traffic into zones defined by the source
IP and/or network interface. Each zone has its own configuration to
accept or deny packets based on specified criteria.
&lt;/p&gt;

&lt;p&gt;
Another improvement over iptables is a simplified
syntax. Firewalld makes it easier to
specify services by using the name of the service rather than its port(s) and
protocol(s)—for example, samba rather than UDP ports 137 and 138 and TCP ports 139 and
445. It further simplifies syntax by removing the dependence on the order of statements
as was the case for iptables.
&lt;/p&gt;

&lt;p&gt;
Finally, firewalld enables the interactive modification of netfilter, allowing a change
in the firewall to occur independently of the permanent configuration stored in XML.
Thus, the following is a temporary modification that will be overwritten by the next
reload:

&lt;/p&gt;&lt;pre&gt;
&lt;code&gt;
# firewall-cmd &lt;some modification&gt;
&lt;/code&gt;
&lt;/pre&gt;


&lt;p&gt;
And, the following is a permanent change that persists across reboots:

&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/understanding-firewalld-multi-zone-configurations" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 02 Feb 2017 12:27:17 +0000</pubDate>
    <dc:creator>Nathan Vance</dc:creator>
    <guid isPermaLink="false">1339272 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
