Understanding firewalld, Zones, and ipsets in ViciBox
When securing a ViciBox server, you may need to audit which IPs are allowed through firewalld. This guide explains how zones and ipsets interact, with sample commands.
1. List Zones
Run:
firewall-cmd --get-zonesExample output:
block dmz drop external home internal public trusted work2. Check Active Zones and Interfaces
firewall-cmd --get-active-zonesThis shows which interfaces belong to each zone.
3. Inspect All Rules in a Zone
firewall-cmd --zone=external --list-allTypical output lists ipsets if they are in use:
external
sources: ipset:whiteips ipset:whitenets ipset:dynamiclist
services: ssh
ports: 5060/udp 5061/udp4. Show Sources Directly
If ipsets are not used, you might see individual IPs:
firewall-cmd --zone=external --list-sourcesExample:
203.0.113.5 198.51.100.0/245. Query ipsets
View all ipsets:
ipset listOr list members of a specific set:
ipset list whiteipsOutput resembles:
Name: whiteips
Type: hash:ip
Members:
203.0.113.5
198.51.100.236. Reload After Changes
After updating firewall rules, reload configuration:
firewall-cmd --reloadThis ensures new rules take effect immediately.
Ad Space (Demo)