以前總結的一系列CentOS安裝中間件的教程,都是假設在防火牆關閉的狀況下進行的,在實戰中可能會遇到端口不通等狀況,若是是ECS雲服務器,能夠經過修改安全組策略的方式開啓或關閉端口訪問,但若是是本身的機器,須要手動關閉防火牆(或開啓指定端口的訪問),下面就介紹下CentOS 7和CentOS 6防火牆的經常使用設置python
首先,確認服務器操做系統版本:shell
shell> cat /etc/redhat-release CentOS Linux release 7.6.1810 (Core)
shell> systemctl status firewalld ● firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; disabled; vendor preset: enabled) Active: active (running) since Mon 2020-04-06 00:03:45 CST; 2s ago Docs: man:firewalld(1) Main PID: 5463 (firewalld) CGroup: /system.slice/firewalld.service └─5463 /usr/bin/python2 -Es /usr/sbin/firewalld --nofork --nopid
shell> systemctl status firewalld ● firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; disabled; vendor preset: enabled) Active: inactive (dead) Docs: man:firewalld(1)
shell> systemctl start firewalld
shell> systemctl stop firewalld
shell> systemctl restart firewalld
shell> systemctl enable firewalld
shell> systemctl disable firewalld
綜上,CentOS 7若是想簡單粗暴的完全關閉防火牆,直接執行:vim
shell> systemctl stop firewalld shell> systemctl disable firewalld
shell> firewall-cmd --state running
shell> firewall-cmd --state not running
shell> firewall-cmd --list-all public (active) target: default icmp-block-inversion: no interfaces: enp2s0 sources: services: ssh dhcpv6-client ports: 3888/tcp 2181/tcp protocols: masquerade: no forward-ports: source-ports: icmp-blocks: rich rules:
shell> firewall-cmd --list-ports 3888/tcp 2181/tcp
shell> firewall-cmd --query-port=3306/tcp no shell> firewall-cmd --query-port=2181/tcp yes
shell> firewall-cmd --add-port=2888/tcp --permanent success shell> firewall-cmd --add-port=65001-65010/tcp --permanent shell> firewall-cmd --reload success # 查看是否添加成功 shell> firewall-cmd --list-ports 3888/tcp 2181/tcp 2888/tcp
shell> firewall-cmd --remove-port=2888/tcp --permanent success shell> firewall-cmd --reload success # 查看是否刪除成功 shell> firewall-cmd --list-ports 3888/tcp 2181/tcp
shell> firewall-cmd --add-port=65001-65010/tcp --permanent success shell> firewall-cmd --reload success shell> firewall-cmd --list-ports 3888/tcp 2181/tcp 65001-65010/tcp
shell> firewall-cmd --reload success
shell> service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8888 2 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9200 3 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9000 4 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7002 5 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:15672 6 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:15672 7 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8000 8 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8082 9 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8010 10 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8769 11 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:6379 12 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306 13 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5672 14 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:15672 15 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2181 16 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 17 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 18 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 19 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 20 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 21 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited 22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7002 23 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8001 24 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 8888 Chain FORWARD (policy ACCEPT) num target prot opt source destination 1 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT) num target prot opt source destination
shell> service iptables status iptables: Firewall is not running.
shell> service iptables start iptables: Applying firewall rules: [ OK ]
shell> service iptables stop iptables: Setting chains to policy ACCEPT: filter [ OK ] iptables: Flushing firewall rules: [ OK ] iptables: Unloading modules: [ OK ]
shell> service iptables restart iptables: Setting chains to policy ACCEPT: filter [ OK ] iptables: Flushing firewall rules: [ OK ] iptables: Unloading modules: [ OK ] iptables: Applying firewall rules: [ OK ]
shell> chkconfig iptables on
shell> chkconfig iptables off
綜上,CentOS 6若是想簡單粗暴的完全關閉防火牆,直接執行:安全
shell> service iptables stop shell> chkconfig iptables off
shell> vim /etc/sysconfig/iptables
添加如下內容(假設要開放的端口爲」2888「)bash
-A INPUT -p tcp -m tcp --dport 2888 -j ACCEPT
重啓防火牆服務器
shell> service iptables restart
shell> service iptables status Table: filter Chain INPUT (policy ACCEPT) num target prot opt source destination ... 16 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2888 ...