Redirect port 8888 on zone public to be redirected to same port on zone “external” and IP address...











up vote
0
down vote

favorite












I've an application which is running locally on 127.0.0.1 and port 8888 in addition to openvpn which is installed and using eth1 interface



The active zones on firewall firewall-cmd:




  1. public (interface: eth0)

  2. external (interface: lo eth1)


What i'm trying to do :




  1. Allow port 8888/tcp on zone public with the openvpn IP source only (To ensure that only in case when the user gets connected to the VPN first then he should be able to access port 8888)

  2. Redirecting the public port 8888 where internally the firewall redirects the targeted public port 8888 on zone public to the local IP address 127.0.0.1 and the local port 8888 on zone external


I tried these commands but didn't help:



# firewall-cmd --permanent --zone=external --add-interface=eth1
# firewall-cmd --permanent --zone=external --add-port=8888/tcp
# firewall-cmd --permanent --zone=public --add-rich-rule='
rule family="ipv4"
source address="10.8.0.0/24"
port protocol="tcp" port="8888" accept'
# firewall-cmd --permanent --zone=public --add-forward-port=port=8888:proto=tcp:toport=8888:toaddr=127.0.0.1


Any hints ?









share







New contributor




Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
























    up vote
    0
    down vote

    favorite












    I've an application which is running locally on 127.0.0.1 and port 8888 in addition to openvpn which is installed and using eth1 interface



    The active zones on firewall firewall-cmd:




    1. public (interface: eth0)

    2. external (interface: lo eth1)


    What i'm trying to do :




    1. Allow port 8888/tcp on zone public with the openvpn IP source only (To ensure that only in case when the user gets connected to the VPN first then he should be able to access port 8888)

    2. Redirecting the public port 8888 where internally the firewall redirects the targeted public port 8888 on zone public to the local IP address 127.0.0.1 and the local port 8888 on zone external


    I tried these commands but didn't help:



    # firewall-cmd --permanent --zone=external --add-interface=eth1
    # firewall-cmd --permanent --zone=external --add-port=8888/tcp
    # firewall-cmd --permanent --zone=public --add-rich-rule='
    rule family="ipv4"
    source address="10.8.0.0/24"
    port protocol="tcp" port="8888" accept'
    # firewall-cmd --permanent --zone=public --add-forward-port=port=8888:proto=tcp:toport=8888:toaddr=127.0.0.1


    Any hints ?









    share







    New contributor




    Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.






















      up vote
      0
      down vote

      favorite









      up vote
      0
      down vote

      favorite











      I've an application which is running locally on 127.0.0.1 and port 8888 in addition to openvpn which is installed and using eth1 interface



      The active zones on firewall firewall-cmd:




      1. public (interface: eth0)

      2. external (interface: lo eth1)


      What i'm trying to do :




      1. Allow port 8888/tcp on zone public with the openvpn IP source only (To ensure that only in case when the user gets connected to the VPN first then he should be able to access port 8888)

      2. Redirecting the public port 8888 where internally the firewall redirects the targeted public port 8888 on zone public to the local IP address 127.0.0.1 and the local port 8888 on zone external


      I tried these commands but didn't help:



      # firewall-cmd --permanent --zone=external --add-interface=eth1
      # firewall-cmd --permanent --zone=external --add-port=8888/tcp
      # firewall-cmd --permanent --zone=public --add-rich-rule='
      rule family="ipv4"
      source address="10.8.0.0/24"
      port protocol="tcp" port="8888" accept'
      # firewall-cmd --permanent --zone=public --add-forward-port=port=8888:proto=tcp:toport=8888:toaddr=127.0.0.1


      Any hints ?









      share







      New contributor




      Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      I've an application which is running locally on 127.0.0.1 and port 8888 in addition to openvpn which is installed and using eth1 interface



      The active zones on firewall firewall-cmd:




      1. public (interface: eth0)

      2. external (interface: lo eth1)


      What i'm trying to do :




      1. Allow port 8888/tcp on zone public with the openvpn IP source only (To ensure that only in case when the user gets connected to the VPN first then he should be able to access port 8888)

      2. Redirecting the public port 8888 where internally the firewall redirects the targeted public port 8888 on zone public to the local IP address 127.0.0.1 and the local port 8888 on zone external


      I tried these commands but didn't help:



      # firewall-cmd --permanent --zone=external --add-interface=eth1
      # firewall-cmd --permanent --zone=external --add-port=8888/tcp
      # firewall-cmd --permanent --zone=public --add-rich-rule='
      rule family="ipv4"
      source address="10.8.0.0/24"
      port protocol="tcp" port="8888" accept'
      # firewall-cmd --permanent --zone=public --add-forward-port=port=8888:proto=tcp:toport=8888:toaddr=127.0.0.1


      Any hints ?







      linux centos iptables firewall port-forwarding





      share







      New contributor




      Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.










      share







      New contributor




      Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.








      share



      share






      New contributor




      Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 1 min ago









      Jason4Ever

      101




      101




      New contributor




      Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Jason4Ever is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.



























          active

          oldest

          votes











          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "106"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });






          Jason4Ever is a new contributor. Be nice, and check out our Code of Conduct.










           

          draft saved


          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f481398%2fredirect-port-8888-on-zone-public-to-be-redirected-to-same-port-on-zone-externa%23new-answer', 'question_page');
          }
          );

          Post as a guest





































          active

          oldest

          votes













          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes








          Jason4Ever is a new contributor. Be nice, and check out our Code of Conduct.










           

          draft saved


          draft discarded


















          Jason4Ever is a new contributor. Be nice, and check out our Code of Conduct.













          Jason4Ever is a new contributor. Be nice, and check out our Code of Conduct.












          Jason4Ever is a new contributor. Be nice, and check out our Code of Conduct.















           


          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f481398%2fredirect-port-8888-on-zone-public-to-be-redirected-to-same-port-on-zone-externa%23new-answer', 'question_page');
          }
          );

          Post as a guest




















































































          Popular posts from this blog

          How to reconfigure Docker Trusted Registry 2.x.x to use CEPH FS mount instead of NFS and other traditional...

          is 'sed' thread safe

          How to make a Squid Proxy server?