暂无图片
暂无图片
暂无图片
暂无图片
暂无图片

redhat 7.9 防火墙增加端口访问策略

原创 伟鹏 2024-05-13
772

1、需求

因监控需求,需要监控部署在redhat7.9服务器上的mysql单机数据库,但是zabbix agent的10050端口无法通,发现是开启了防火墙,增加端口访问策略。添加了端口10050/tcp到防火墙规则中,并重新加载了防火墙配置。步骤如下

2、处理过程

2.1. 查看系统版本信息:

cat /etc/redhat-release

输出显示您的系统是Red Hat Enterprise Linux Server release 7.9 (Maipo)。

2.2. 查看firewalld服务状态:

[root@***-single ~]# systemctl status firewalld firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled) Active: active (running) since Wed 2023-11-22 18:39:14 CST; 5 months 20 days ago Docs: man:firewalld(1) Main PID: 911 (firewalld) CGroup: /system.slice/firewalld.service └─911 /usr/bin/python2 -Es /usr/sbin/firewalld --nofork --nopid Nov 22 18:39:13 zentao-single systemd[1]: Starting firewalld - dynamic firewall daemon... Nov 22 18:39:14 zentao-single systemd[1]: Started firewalld - dynamic firewall daemon. Nov 22 18:39:14 zentao-single firewalld[911]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future ...ing it now. Dec 05 14:12:15 zentao-single firewalld[911]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future ...ing it now. Dec 05 14:14:51 zentao-single firewalld[911]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future ...ing it now. Dec 05 14:16:16 zentao-single firewalld[911]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future ...ing it now. Dec 18 17:28:37 zentao-single firewalld[911]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future ...ing it now. Dec 18 17:28:52 zentao-single firewalld[911]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future ...ing it now. Hint: Some lines were ellipsized, use -l to show in full.

输出显示firewalld服务当前处于活动状态(active),并且已经运行了5个月20天。

2.3. 查看所有防火墙规则:

[root@***-single ~]# firewall-cmd --permanent --add-port=10050/tcp
success
[root@zentao-single ~]# firewall-cmd  --list-all
public (active)
  target: default
  icmp-block-inversion: no
  interfaces: eth0
  sources: 
  services: dhcpv6-client ssh
  ports: 80/tcp 3306/tcp
  protocols: 
  masquerade: no
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 
	rule family="ipv4" source address="1**.1*8.1*6.1*" port port="9100" protocol="tcp" accept

输出显示当前的防火墙规则,包括默认的目标(target)、接口(interfaces)、服务(services)和端口(ports)。

2.4. 添加端口10050/tcp到防火墙规则中:

[root@***-single ~]# firewall-cmd --permanent --add-port=10050/tcp
success

此命令将端口10050/tcp添加到防火墙规则中,并设置为永久生效。

2.5. 重新加载防火墙配置:

[root@***-single ~]# firewall-cmd --reload
success

此命令重新加载防火墙配置,使之前所做的更改生效。

2.6. 再次查看所有防火墙规则:

[root@***-single ~]# firewall-cmd  --list-all
public (active)
  target: default
  icmp-block-inversion: no
  interfaces: eth0
  sources: 
  services: dhcpv6-client ssh
  ports: 80/tcp 3306/tcp 10050/tcp
  protocols: 
  masquerade: no
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 
	rule family="ipv4" source address="1**.1*8.1*6.1*" port port="9100" protocol="tcp" accept

输出显示更新后的防火墙规则,现在包含了新添加的端口10050/tcp。

2.7 端口测试

[root@oracle_zabbix_*** ~]# telnet 1**.18.16.1* 10050
Trying 1**.18.16.1*…
Connected to 1**.18.16.1*
Escape character is ‘^]’.
^CConnection closed by foreign host.

通过以上步骤,将端口10050/tcp添加到防火墙规则中,并使其生效。这将允许外部设备通过该端口与您的服务器进行通信。请确保在执行这些操作时具有适当的权限,并根据实际需求调整防火墙规则以满足您的安全要求。

「喜欢这篇文章,您的关注和赞赏是给作者最好的鼓励」
关注作者
【版权声明】本文为墨天轮用户原创内容,转载时必须标注文章的来源(墨天轮),文章链接,文章作者等基本信息,否则作者和墨天轮有权追究责任。如果您发现墨天轮中有涉嫌抄袭或者侵权的内容,欢迎发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。

评论