1FIREWALLD.ZONES(5) firewalld.zones FIREWALLD.ZONES(5)
2
3
4
6 firewalld.zones - firewalld zones
7
9 What is a zone?
10 A network zone defines the level of trust for network connections. This
11 is a one to many relation, which means that a connection can only be
12 part of one zone, but a zone can be used for many network connections.
13
14 The zone defines the firewall features that are enabled in this zone:
15
16 Predefined services
17 A service is a combination of port and/or protocol entries.
18 Optionally netfilter helper modules can be added and also a IPv4
19 and IPv6 destination address.
20
21 Ports and protocols
22 Definition of tcp or udp ports, where ports can be a single port or
23 a port range.
24
25 ICMP blocks
26 Blocks selected Internet Control Message Protocol (ICMP) messages.
27 These messages are either information requests or created as a
28 reply to information requests or in error conditions.
29
30 Masquerading
31 The addresses of a private network are mapped to and hidden behind
32 a public IP address. This is a form of address translation.
33
34 Forward ports
35 A forward port is either mapped to the same port on another host or
36 to another port on the same host or to another port on another
37 host.
38
39 Rich language rules
40 The rich language extends the elements (service, port, icmp-block,
41 masquerade, forward-port and source-port) with additional source
42 and destination addresses, logging, actions and limits for logs and
43 actions. It can also be used for host or network white and black
44 listing (for more information, please have a look at
45 firewalld.richlanguage(5)).
46
47 For more information on the zone file format, please have a look at
48 firewalld.zone(5).
49
50 Which zones are available?
51 Here are the zones provided by firewalld sorted according to the
52 default trust level of the zones from untrusted to trusted:
53
54 drop
55 Any incoming network packets are dropped, there is no reply. Only
56 outgoing network connections are possible.
57
58 block
59 Any incoming network connections are rejected with an
60 icmp-host-prohibited message for IPv4 and icmp6-adm-prohibited for
61 IPv6. Only network connections initiated within this system are
62 possible.
63
64 public
65 For use in public areas. You do not trust the other computers on
66 networks to not harm your computer. Only selected incoming
67 connections are accepted.
68
69 external
70 For use on external networks with masquerading enabled especially
71 for routers. You do not trust the other computers on networks to
72 not harm your computer. Only selected incoming connections are
73 accepted.
74
75 dmz
76 For computers in your demilitarized zone that are
77 publicly-accessible with limited access to your internal network.
78 Only selected incoming connections are accepted.
79
80 work
81 For use in work areas. You mostly trust the other computers on
82 networks to not harm your computer. Only selected incoming
83 connections are accepted.
84
85 home
86 For use in home areas. You mostly trust the other computers on
87 networks to not harm your computer. Only selected incoming
88 connections are accepted.
89
90 internal
91 For use on internal networks. You mostly trust the other computers
92 on the networks to not harm your computer. Only selected incoming
93 connections are accepted.
94
95 trusted
96 All network connections are accepted.
97
98 Which zone should be used?
99 A public WIFI network connection for example should be mainly
100 untrusted, a wired home network connection should be fairly trusted.
101 Select the zone that best matches the network you are using.
102
103 How to configure or add zones?
104 To configure or add zones you can either use one of the firewalld
105 interfaces to handle and change the configuration: These are the
106 graphical configuration tool firewall-config, the command line tool
107 firewall-cmd or the D-Bus interface. Or you can create or copy a zone
108 file in one of the configuration directories. /usr/lib/firewalld/zones
109 is used for default and fallback configurations and
110 /etc/firewalld/zones is used for user created and customized
111 configuration files.
112
113 How to set or change a zone for a connection?
114 The zone is stored into the ifcfg of the connection with ZONE= option.
115 If the option is missing or empty, the default zone set in firewalld is
116 used.
117
118 If the connection is controlled by NetworkManager, you can also use
119 nm-connection-editor to change the zone.
120
121 For the addion or change of interfaces that are not under control of
122 NetworkManager: firewalld tries to change the ZONE setting in the ifcfg
123 file, if an ifcfg file exists that is using the interface.
124
125 Only for the removal of interfaces that are not under control of
126 NetworkManager: firewalld is not trying to change the ZONE setting in
127 the ifcfg file. This is needed to make sure that an ifdown of the
128 interface will not result in a reset of the zone setting to the default
129 zone. Only the zone binding is then removed in firewalld then.
130
132 firewall-applet(1), firewalld(1), firewall-cmd(1), firewall-config(1),
133 firewalld.conf(5), firewalld.direct(5), firewalld.dbus(5),
134 firewalld.icmptype(5), firewalld.lockdown-whitelist(5), firewall-
135 offline-cmd(1), firewalld.richlanguage(5), firewalld.service(5),
136 firewalld.zone(5), firewalld.zones(5), firewalld.policy(5),
137 firewalld.policies(5), firewalld.ipset(5), firewalld.helper(5)
138
140 firewalld home page:
141 http://firewalld.org
142
143 More documentation with examples:
144 http://fedoraproject.org/wiki/FirewallD
145
147 Thomas Woerner <twoerner@redhat.com>
148 Developer
149
150 Jiri Popelka <jpopelka@redhat.com>
151 Developer
152
153 Eric Garver <eric@garver.life>
154 Developer
155
156
157
158firewalld 0.9.3 FIREWALLD.ZONES(5)