{"id":2809,"date":"2018-10-22T23:04:34","date_gmt":"2018-10-22T17:34:34","guid":{"rendered":"https:\/\/blog.pheonixsolutions.com\/?p=2809"},"modified":"2018-10-23T09:07:23","modified_gmt":"2018-10-23T03:37:23","slug":"things-to-know-about-firewall-cmd","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/","title":{"rendered":"Things to know about Firewall cmd"},"content":{"rendered":"<p><strong>Things to know about Firewall cmd<\/strong><\/p>\n<p><strong>Date : 22-Oct-2018<\/strong><\/p>\n<p><strong>firewall-cmd &#8211; <\/strong>Firewall Command Line Client tool. This is part of the firewalld application,which is installed by default.<\/p>\n<p><strong>Introduction:<\/strong><\/p>\n<p>\uf0a7 Firewall-cmd is the command line client of the firewalld daemon (firewall management tool for Linux OS). It provides interface to manage runtime and permanent configuration.<br \/>\n\uf0a7 The runtime configuration (non-permanent configuration) in firewalld is separated from the permanent configuration. This means that things can get changed in the runtime or permanent configuration.<br \/>\n\uf0a7 It also provides an interfaces for services or applications to add iptables(ipv4),ip6tables(ipv6) and ebtables.<br \/>\n<span style=\"text-decoration: underline;\">Note :<\/span> ebtales &#8211; it is an application program used to setup and maintain tables of rules (inside Linux Kernel) that inspects Ethernet frame.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2810 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg\" alt=\"\" width=\"577\" height=\"274\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg 577w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/firewall-cmd-300x142.jpg 300w\" sizes=\"auto, (max-width: 577px) 100vw, 577px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>In this above fig,its clearly states that firewalld D-Bus will be act as primary way to apply the changes or create configuration.The interfaces used by the firewalld provided online tools such as firewallcmd ,firewall-config,firewall-applet.whereas,firewalld-offline-cmd bypass the firewalld D-bus directly to core layer with IO Handlers to alter or create configuration either permanent or runtime. But this one is not recommended because by this way we can only alter the permanent configuration and anyhow changes will be visible in firewall after about 5 minutes.<\/p>\n<p><strong>Assumption :\u00a0<\/strong><\/p>\n<p>Practicing firewall commands in centos7 Linux Distribution.<\/p>\n<p><strong>1.Installation of firewalld<\/strong><\/p>\n<p>Following commands are for installing the firewalld in CentOS 7 Linux Distribution<\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#yum -y install firewalld<br \/>\n<\/code><\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#systemctl enable firewalld<br \/>\n<\/code><\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#systemctl restart firewalld<br \/>\n<\/code><\/p>\n<p>2.List of commands for firewall-cmd,<\/p>\n<p>2.1 Basic Commands<\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#firewall-cmd  --Version<\/code><\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#firewall-cmd  --help<br \/>\n<\/code><\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#firewall-cmd \u2013state : check running or not<br \/>\n<\/code><\/p>\n<p><strong>2.2\u00a0Firewalld is a zone based firewall<\/strong>, each zone is capable of configured to accept or deny some services with different level of security.<br \/>\nZone can be associated with one or more interfaces.<\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#firewall-cmd --get-zones<\/code><\/p>\n<p>The above command shows what are zones available in the firewall system.But, if we need to know what services and ports available for them.<\/p>\n<p>To view the services and ports for the particular zone, use the below command.<\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">#firwall-cmd --zone=home --list-all<\/code><\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2812 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-2.jpg\" alt=\"\" width=\"435\" height=\"269\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-2.jpg 435w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-2-300x186.jpg 300w\" sizes=\"auto, (max-width: 435px) 100vw, 435px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>2.3 Firewall zone manipulation<\/strong><\/p>\n<p>The default zone is Public.How can we change the default zone (The default zone can be changed to any other zone by using following command),<\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\"># firewall-cmd \u2013set-default= &lt; choose your desired zone &gt;<\/code><\/p>\n<p><strong>2.4 How to add service to the zone in firewall-cmd<\/strong><\/p>\n<p>Firstly service are preconfigured set of ports associated with protocol.<br \/>\nFor example,<br \/>\nSSH service will include the port 22 TCP<br \/>\nSamba service will include the set of ports 139 &amp; 145 TCP and 137 &amp; 138 UDP<\/p>\n<p>Now we are adding\/removing services to the zone and verifying it using following commands,<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2813 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-3.jpg\" alt=\"\" width=\"595\" height=\"426\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-3.jpg 595w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-3-300x215.jpg 300w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The above command is as runtime configuration (non-permanent).If we reload the firewall system,this changes maynot be available in the list. Lets check it,<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-4.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2814 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-4.jpg\" alt=\"\" width=\"505\" height=\"115\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-4.jpg 505w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-4-300x68.jpg 300w\" sizes=\"auto, (max-width: 505px) 100vw, 505px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>To make it persistent modification to a zone, we need to add &#8211;permanent option in the command.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2815 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-5.jpg\" alt=\"\" width=\"504\" height=\"158\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-5.jpg 504w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-5-300x94.jpg 300w\" sizes=\"auto, (max-width: 504px) 100vw, 504px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>2.5 How to add ports to the zone in firewall-cmd<\/strong><\/p>\n<p>Following the same steps as like service for ports (just replace service as port and its identity)<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2816 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-6.jpg\" alt=\"\" width=\"605\" height=\"374\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-6.jpg 605w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-6-300x185.jpg 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2.6 How to add zones to the firewall-cmd<\/strong><\/p>\n<p>In above content we seen only how to alter the existing zone.Now lets see about how to create the zone.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2817 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-7.jpg\" alt=\"\" width=\"508\" height=\"387\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-7.jpg 508w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-7-300x229.jpg 300w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2.7\u00a0 How to associate a zone with interface<\/strong><\/p>\n<p>Creating a zone in the firewall system is first step.Now, we want to use the new created zone , associating with the ens5f5 ethernet interface.<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2818 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-8.jpg\" alt=\"\" width=\"561\" height=\"313\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-8.jpg 561w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-8-300x167.jpg 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2.8 How to delete the existing zones,<\/strong><\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2819 aligncenter\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/1-9.jpg\" alt=\"\" width=\"524\" height=\"161\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-9.jpg 524w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/10\/1-9-300x92.jpg 300w\" sizes=\"auto, (max-width: 524px) 100vw, 524px\" \/><\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><em>Note<\/em><\/span> : Important contents need to know as follows,<\/p>\n<p><strong>2.9\u00a0 RICH rules<\/strong><\/p>\n<p>In certain situations we need to create more complex rules as not allowing some ports and some services in particular zone.<\/p>\n<p>The rule comprehended into two parts:<br \/>\n1st\u00a0 \u00a0: Specifying the condition which might be applicable<br \/>\n2nd\u00a0 : Execution, if rule 1 satisfied the following action to be executed either accept or drop or reject.<\/p>\n<p>Scenario,Lets say for example if I need to block the traffic from ip 192.168.1.0 in local network.<\/p>\n<p>The rich rule will be,<br \/>\n#firewall-cmd \u2013zone=external \u2013add-rich-rule=\u201drule\u201d \\family=\u201dipv4\u201d \\ source address =192.168.1.0 \\ service name =ssh\\reject\\<\/p>\n<p><strong>2.10 Panic Mode<\/strong><\/p>\n<p>The panic mode is a mode that could be used only in situations when there is serious problem in the network environment.When this connection is enabled,all other exiting connections are discarded and all incoming\/outgoing packets are dropped.<\/p>\n<p>#firewall-cmd &#8211; -panic-on\u00a0 %%% to enable this mode<br \/>\n#firewall-cmd &#8211; -panic-off\u00a0 %%% to disable this mode<br \/>\n#firewall-cmd &#8211; -query-panic\u00a0 %%% to query panic mode status<\/p>\n<p><em><span style=\"text-decoration: underline;\">Note<\/span> <\/em>:\u00a0 FYI, this mode only works in the run time configuration and cannot be used with the &#8211; &#8211; permanent.<\/p>\n<p>&nbsp;<\/p>\n<p>Hope this post will be useful for basic understanding of firewall-cmd in centos 7 distribution. Please leave a reply, for any suggestions\/queries which will be useful for us to serve in a better way.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Things to know about Firewall cmd Date : 22-Oct-2018 firewall-cmd &#8211; Firewall Command Line Client tool. This is part of the firewalld application,which is installed by default. Introduction: \uf0a7 Firewall-cmd is the command line client of the firewalld daemon (firewall management tool for Linux OS). It provides interface to manage&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\">Things to know about Firewall cmd<\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[284,222,309,282],"tags":[460,458,459,423],"class_list":{"0":"post-2809","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-centos","7":"category-linux-commandsscripts","8":"category-redhat","9":"category-ubuntu","10":"tag-commands","11":"tag-firewall","12":"tag-firewall-cmd","13":"tag-firewalld","14":"h-entry","16":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"Things to know about Firewall cmd Date : 22-Oct-2018 firewall-cmd &#8211; Firewall Command Line Client tool. This is part of the firewalld application,which is installed by default. Introduction: \uf0a7 Firewall-cmd is the command line client of the firewalld daemon (firewall management tool for Linux OS). It provides interface to manage&hellip; Continue Reading Things to know about Firewall cmd\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-22T17:34:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-23T03:37:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\"},\"headline\":\"Things to know about Firewall cmd\",\"datePublished\":\"2018-10-22T17:34:34+00:00\",\"dateModified\":\"2018-10-23T03:37:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/\"},\"wordCount\":766,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/firewall-cmd.jpg\",\"keywords\":[\"commands\",\"firewall\",\"firewall-cmd\",\"firewalld\"],\"articleSection\":[\"Centos\",\"Linux Commands\\\/Scripts\",\"Redhat\",\"Ubuntu\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/firewall-cmd.jpg\",\"datePublished\":\"2018-10-22T17:34:34+00:00\",\"dateModified\":\"2018-10-23T03:37:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/firewall-cmd.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/firewall-cmd.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/things-to-know-about-firewall-cmd\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Things to know about Firewall cmd\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/blog.pheonixsolutions.com\"],\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"Things to know about Firewall cmd Date : 22-Oct-2018 firewall-cmd &#8211; Firewall Command Line Client tool. This is part of the firewalld application,which is installed by default. Introduction: \uf0a7 Firewall-cmd is the command line client of the firewalld daemon (firewall management tool for Linux OS). It provides interface to manage&hellip; Continue Reading Things to know about Firewall cmd","og_url":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2018-10-22T17:34:34+00:00","article_modified_time":"2018-10-23T03:37:23+00:00","og_image":[{"url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/"},"author":{"name":"admin","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503"},"headline":"Things to know about Firewall cmd","datePublished":"2018-10-22T17:34:34+00:00","dateModified":"2018-10-23T03:37:23+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/"},"wordCount":766,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg","keywords":["commands","firewall","firewall-cmd","firewalld"],"articleSection":["Centos","Linux Commands\/Scripts","Redhat","Ubuntu"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/","url":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg","datePublished":"2018-10-22T17:34:34+00:00","dateModified":"2018-10-23T03:37:23+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#primaryimage","url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg","contentUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/10\/firewall-cmd.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/things-to-know-about-firewall-cmd\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Things to know about Firewall cmd"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","caption":"admin"},"sameAs":["http:\/\/blog.pheonixsolutions.com"],"url":"https:\/\/pheonixsolutions.com\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-Jj","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/2809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=2809"}],"version-history":[{"count":0,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/2809\/revisions"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=2809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=2809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=2809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}