We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There's currently no FirewallD support.
Include the FirewallD equivalents of the UFW rules
systemtcl enable --now firewalld firewall-cmd --state # Limiting Workaround (https://github.com/firewalld/firewalld/issues/70) firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 0 -p tcp --dport 22 \ -m state --state NEW -m recent --set firewall-cmd --permanent --direct --add-rule ipv6 filter INPUT_direct 0 -p tcp --dport 22 \ -m state --state NEW -m recent --set firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 1 -p tcp --dport 22 \ -m state --state NEW -m recent --update --seconds 30 --hitcount 6 \ -j REJECT --reject-with tcp-reset firewall-cmd --permanent --direct --add-rule ipv6 filter INPUT_direct 1 -p tcp --dport 22 \ -m state --state NEW -m recent --update --seconds 30 --hitcount 6 \ -j REJECT --reject-with tcp-reset # Allow HTTP/S firewall-cmd --permanent --add-service=http firewall-cmd --permanent --add-service=https firewall-cmd --reload
Do it manually.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Is your feature request related to a problem? Please describe.
There's currently no FirewallD support.
Describe the solution you'd like
Include the FirewallD equivalents of the UFW rules
Describe alternatives you've considered
Do it manually.
Additional context
Checklist
The text was updated successfully, but these errors were encountered: