{"id":61580,"date":"2025-04-29T10:53:23","date_gmt":"2025-04-29T02:53:23","guid":{"rendered":"https:\/\/fwq.ai\/blog\/61580\/"},"modified":"2025-04-29T10:53:23","modified_gmt":"2025-04-29T02:53:23","slug":"%e5%a6%82%e4%bd%95%e4%bd%bf%e7%94%a8%e9%98%b2%e7%81%ab%e5%a2%99%e8%ae%be%e7%bd%aecentos%e6%9c%8d%e5%8a%a1%e5%99%a8%e7%9a%84%e7%bd%91%e7%bb%9c%e4%bc%a0%e8%be%93%e5%ae%89%e5%85%a8-2","status":"publish","type":"post","link":"https:\/\/fwq.ai\/blog\/61580\/","title":{"rendered":"\u5982\u4f55\u4f7f\u7528\u9632\u706b\u5899\u8bbe\u7f6eCentOS\u670d\u52a1\u5668\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168"},"content":{"rendered":"<p>\u5982\u4f55\u4f7f\u7528\u9632\u706b\u5899\u8bbe\u7f6e\u670d\u52a1\u5668\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168<\/p>\n<p>\u9632\u706b\u5899\u662f\u670d\u52a1\u5668\u5b89\u5168\u4e2d\u7684\u91cd\u8981\u7ec4\u6210\u90e8\u5206\u4e4b\u4e00\uff0c\u5b83\u53ef\u4ee5\u5e2e\u52a9\u6211\u4eec\u8fc7\u6ee4\u6389\u6076\u610f\u7684\u7f51\u7edc\u6d41\u91cf\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u514d\u53d7\u5165\u4fb5\u548c\u653b\u51fb\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u4f7f\u7528\u9632\u706b\u5899\u8bbe\u7f6ecentos\u670d\u52a1\u5668\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168\uff0c\u5e76\u9644\u4e0a\u4ee3\u7801\u793a\u4f8b\u3002<\/p>\n<ol>\n<li>\u68c0\u67e5\u9632\u706b\u5899\u72b6\u6001<br \/>\u5728\u5f00\u59cb\u8bbe\u7f6e\u4e4b\u524d\uff0c\u6211\u4eec\u5148\u8981\u786e\u8ba4\u9632\u706b\u5899\u662f\u5426\u5df2\u7ecf\u542f\u7528\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u68c0\u67e5\u9632\u706b\u5899\u72b6\u6001\uff1a<\/li>\n<\/ol>\n<pre>sudo systemctl status firewalld<\/pre>\n<p> \u767b\u5f55\u540e\u590d\u5236 <\/p>\n<p>\u5982\u679c\u8f93\u51fa\u663e\u793a&#8221;active (running)&#8221;\uff0c\u5219\u8868\u793a\u9632\u706b\u5899\u5df2\u7ecf\u542f\u7528\uff1b\u5982\u679c\u8f93\u51fa\u663e\u793a&#8221;inactive (dead)&#8221;\uff0c\u5219\u8868\u793a\u9632\u706b\u5899\u672a\u542f\u7528\u3002<\/p>\n<ol>\n<li>\u542f\u7528\u9632\u706b\u5899<br \/>\u5982\u679c\u9632\u706b\u5899\u672a\u542f\u7528\uff0c\u6211\u4eec\u9700\u8981\u5148\u542f\u7528\u5b83\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u542f\u7528\u9632\u706b\u5899\uff1a<\/li>\n<\/ol>\n<pre>sudo systemctl start firewalld<\/pre>\n<p> \u767b\u5f55\u540e\u590d\u5236 <\/p>\n<ol>\n<li>\u8bbe\u7f6e\u9ed8\u8ba4\u9632\u706b\u5899\u89c4\u5219<br \/>\u5728\u8bbe\u7f6e\u5177\u4f53\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168\u89c4\u5219\u4e4b\u524d\uff0c\u6211\u4eec\u5148\u8bbe\u7f6e\u4e00\u4e9b\u9ed8\u8ba4\u7684\u9632\u706b\u5899\u89c4\u5219\uff0c\u4ee5\u963b\u6b62\u672a\u6388\u6743\u7684\u8bbf\u95ee\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u8bbe\u7f6e\u9ed8\u8ba4\u89c4\u5219\uff1a<\/li>\n<\/ol>\n<pre>sudo firewall-cmd --set-default-zone=public\nsudo firewall-cmd --permanent --zone=public --remove-service=dhcpv6-client\nsudo firewall-cmd --permanent --zone=public --remove-service=dhcpv6-server\nsudo firewall-cmd --reload<\/pre>\n<p> \u767b\u5f55\u540e\u590d\u5236 <\/p>\n<p>\u4ee5\u4e0a\u547d\u4ee4\u5c06\u8bbe\u7f6e\u9ed8\u8ba4\u7684\u9632\u706b\u5899\u533a\u57df\u4e3a&#8221;public&#8221;\uff0c\u5e76\u4e14\u79fb\u9664\u4e86\u4e0eDHCPv6\u5ba2\u6237\u7aef\u548c\u670d\u52a1\u5668\u76f8\u5173\u7684\u670d\u52a1\u3002<\/p>\n<ol>\n<li>\u5f00\u653e\u9700\u8981\u7684\u7aef\u53e3<br \/>\u63a5\u4e0b\u6765\uff0c\u6211\u4eec\u9700\u8981\u5f00\u653e\u670d\u52a1\u5668\u4e0a\u9700\u8981\u4f7f\u7528\u7684\u7aef\u53e3\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u5f00\u653e\u7aef\u53e3\uff0c\u4ee5\u793a\u4f8b\u7aef\u53e380\u4e3a\u4f8b\uff1a<\/li>\n<\/ol>\n<pre>sudo firewall-cmd --permanent --zone=public --add-port=80\/tcp\nsudo firewall-cmd --permanent --zone=public --add-port=80\/udp\nsudo firewall-cmd --reload<\/pre>\n<p> \u767b\u5f55\u540e\u590d\u5236 <\/p>\n<p>\u4ee5\u4e0a\u547d\u4ee4\u5c06\u6c38\u4e45\u5f00\u653e80\u7aef\u53e3\uff0c\u652f\u6301TCP\u548cUDP\u534f\u8bae\u3002<\/p>\n<ol>\n<li>\u5c4f\u853d\u4e0d\u9700\u8981\u7684\u7aef\u53e3<br \/>\u4e3a\u4e86\u589e\u52a0\u670d\u52a1\u5668\u7684\u5b89\u5168\u6027\uff0c\u6211\u4eec\u53ef\u4ee5\u5c4f\u853d\u4e0d\u9700\u8981\u7684\u7aef\u53e3\uff0c\u4ee5\u9632\u6b62\u653b\u51fb\u8005\u5229\u7528\u5b83\u4eec\u8fdb\u884c\u653b\u51fb\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u5c4f\u853d\u6307\u5b9a\u7684\u7aef\u53e3\uff0c\u4ee5\u793a\u4f8b\u7aef\u53e322\u4e3a\u4f8b\uff1a<\/li>\n<\/ol>\n<pre>sudo firewall-cmd --permanent --zone=public --remove-port=22\/tcp\nsudo firewall-cmd --permanent --zone=public --remove-port=22\/udp\nsudo firewall-cmd --reload<\/pre>\n<p> \u767b\u5f55\u540e\u590d\u5236 <\/p>\n<p>\u4ee5\u4e0a\u547d\u4ee4\u5c06\u6c38\u4e45\u5c4f\u853d22\u7aef\u53e3\u7684TCP\u548cUDP\u534f\u8bae\u3002<\/p>\n<ol>\n<li>\u914d\u7f6e\u9632\u706b\u5899\u89c4\u5219<br \/>\u9664\u4e86\u5f00\u653e\u548c\u5c4f\u853d\u7aef\u53e3\u4e4b\u5916\uff0c\u6211\u4eec\u8fd8\u53ef\u4ee5\u6839\u636e\u81ea\u5df1\u7684\u9700\u6c42\u914d\u7f6e\u66f4\u590d\u6742\u7684\u9632\u706b\u5899\u89c4\u5219\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u914d\u7f6e\u89c4\u5219\uff0c\u4ee5\u5141\u8bb8\u6307\u5b9a\u7684IP\u5730\u5740\u8bbf\u95ee\u670d\u52a1\u5668\u7aef\u53e3\uff1a<\/li>\n<\/ol>\n<pre>sudo firewall-cmd --permanent --zone=public --add-rich-rule=\"rule family='ipv4' source address='192.168.0.10' port protocol='tcp' port='3306' accept\"\nsudo firewall-cmd --reload<\/pre>\n<p> \u767b\u5f55\u540e\u590d\u5236 <\/p>\n<p>\u4ee5\u4e0a\u547d\u4ee4\u5c06\u6c38\u4e45\u5141\u8bb8IP\u5730\u5740\u4e3a192.168.0.10\u7684\u4e3b\u673a\u8bbf\u95ee\u670d\u52a1\u5668\u76843306\u7aef\u53e3\u3002<\/p>\n<ol>\n<li>\u68c0\u67e5\u9632\u706b\u5899\u89c4\u5219<br \/>\u5728\u8bbe\u7f6e\u5b8c\u6210\u540e\uff0c\u6211\u4eec\u53ef\u4ee5\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u6765\u67e5\u770b\u5f53\u524d\u7684\u9632\u706b\u5899\u89c4\u5219\uff1a<\/li>\n<\/ol>\n<pre>sudo firewall-cmd --zone=public --list-all<\/pre>\n<p> \u767b\u5f55\u540e\u590d\u5236 <\/p>\n<p>\u4ee5\u4e0a\u547d\u4ee4\u5c06\u663e\u793a\u5f53\u524d&#8221;public&#8221;\u533a\u57df\u7684\u6240\u6709\u9632\u706b\u5899\u89c4\u5219\u3002<\/p>\n<p>\u603b\u7ed3\uff1a<br \/>\u672c\u6587\u4ecb\u7ecd\u4e86\u5982\u4f55\u4f7f\u7528\u9632\u706b\u5899\u8bbe\u7f6ecentos\u670d\u52a1\u5668\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168\u3002\u901a\u8fc7\u8bbe\u7f6e\u9632\u706b\u5899\u89c4\u5219\uff0c\u5f00\u653e\u9700\u8981\u7684\u7aef\u53e3\uff0c\u5c4f\u853d\u4e0d\u9700\u8981\u7684\u7aef\u53e3\uff0c\u4ee5\u53ca\u914d\u7f6e\u590d\u6742\u7684\u89c4\u5219\uff0c\u6211\u4eec\u53ef\u4ee5\u589e\u5f3a\u670d\u52a1\u5668\u7684\u7f51\u7edc\u5b89\u5168\u6027\u3002\u8bf7\u6839\u636e\u5b9e\u9645\u9700\u6c42\u6765\u9009\u62e9\u5408\u9002\u7684\u9632\u706b\u5899\u89c4\u5219\uff0c\u5e76\u5728\u914d\u7f6e\u5b8c\u6210\u540e\u68c0\u67e5\u89c4\u5219\u662f\u5426\u751f\u6548\u3002<\/p>\n<p>\u4ee5\u4e0a\u5c31\u662f\u5982\u4f55\u4f7f\u7528\u9632\u706b\u5899\u8bbe\u7f6eCentOS\u670d\u52a1\u5668\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168\u7684\u8be6\u7ec6\u5185\u5bb9\uff0c\u66f4\u591a\u8bf7\u5173\u6ce8FDCServers\u5176\u5b83\u76f8\u5173\u6587\u7ae0\uff01<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5982\u4f55\u4f7f\u7528\u9632\u706b\u5899\u8bbe\u7f6e\u670d\u52a1\u5668\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168 \u9632\u706b\u5899\u662f\u670d\u52a1\u5668\u5b89\u5168\u4e2d\u7684\u91cd\u8981\u7ec4\u6210\u90e8\u5206\u4e4b\u4e00\uff0c\u5b83\u53ef\u4ee5\u5e2e\u52a9\u6211\u4eec\u8fc7\u6ee4\u6389\u6076\u610f\u7684\u7f51\u7edc\u6d41\u91cf\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u514d\u53d7\u5165\u4fb5\u548c\u653b\u51fb\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u4f7f\u7528\u9632\u706b\u5899\u8bbe\u7f6ecentos\u670d\u52a1\u5668\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168\uff0c\u5e76\u9644\u4e0a\u4ee3\u7801\u793a\u4f8b\u3002 \u68c0\u67e5\u9632\u706b\u5899\u72b6\u6001\u5728\u5f00\u59cb\u8bbe\u7f6e\u4e4b\u524d\uff0c\u6211\u4eec\u5148\u8981\u786e\u8ba4\u9632\u706b\u5899\u662f\u5426\u5df2\u7ecf\u542f\u7528\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u68c0\u67e5\u9632\u706b\u5899\u72b6\u6001\uff1a sudo systemctl status firewalld \u767b\u5f55\u540e\u590d\u5236 \u5982\u679c\u8f93\u51fa\u663e\u793a&#8221;active (running)&#8221;\uff0c\u5219\u8868\u793a\u9632\u706b\u5899\u5df2\u7ecf\u542f\u7528\uff1b\u5982\u679c\u8f93\u51fa\u663e\u793a&#8221;inactive (dead)&#8221;\uff0c\u5219\u8868\u793a\u9632\u706b\u5899\u672a\u542f\u7528\u3002 \u542f\u7528\u9632\u706b\u5899\u5982\u679c\u9632\u706b\u5899\u672a\u542f\u7528\uff0c\u6211\u4eec\u9700\u8981\u5148\u542f\u7528\u5b83\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u542f\u7528\u9632\u706b\u5899\uff1a sudo systemctl start firewalld \u767b\u5f55\u540e\u590d\u5236 \u8bbe\u7f6e\u9ed8\u8ba4\u9632\u706b\u5899\u89c4\u5219\u5728\u8bbe\u7f6e\u5177\u4f53\u7684\u7f51\u7edc\u4f20\u8f93\u5b89\u5168\u89c4\u5219\u4e4b\u524d\uff0c\u6211\u4eec\u5148\u8bbe\u7f6e\u4e00\u4e9b\u9ed8\u8ba4\u7684\u9632\u706b\u5899\u89c4\u5219\uff0c\u4ee5\u963b\u6b62\u672a\u6388\u6743\u7684\u8bbf\u95ee\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u8bbe\u7f6e\u9ed8\u8ba4\u89c4\u5219\uff1a sudo firewall-cmd &#8211;set-default-zone=public sudo firewall-cmd &#8211;permanent &#8211;zone=public &#8211;remove-service=dhcpv6-client sudo firewall-cmd &#8211;permanent &#8211;zone=public &#8211;remove-service=dhcpv6-server sudo firewall-cmd &#8211;reload \u767b\u5f55\u540e\u590d\u5236 \u4ee5\u4e0a\u547d\u4ee4\u5c06\u8bbe\u7f6e\u9ed8\u8ba4\u7684\u9632\u706b\u5899\u533a\u57df\u4e3a&#8221;public&#8221;\uff0c\u5e76\u4e14\u79fb\u9664\u4e86\u4e0eDHCPv6\u5ba2\u6237\u7aef\u548c\u670d\u52a1\u5668\u76f8\u5173\u7684\u670d\u52a1\u3002 \u5f00\u653e\u9700\u8981\u7684\u7aef\u53e3\u63a5\u4e0b\u6765\uff0c\u6211\u4eec\u9700\u8981\u5f00\u653e\u670d\u52a1\u5668\u4e0a\u9700\u8981\u4f7f\u7528\u7684\u7aef\u53e3\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u5f00\u653e\u7aef\u53e3\uff0c\u4ee5\u793a\u4f8b\u7aef\u53e380\u4e3a\u4f8b\uff1a sudo firewall-cmd &#8211;permanent &#8211;zone=public &#8211;add-port=80\/tcp sudo firewall-cmd &#8211;permanent &#8211;zone=public &#8211;add-port=80\/udp sudo firewall-cmd &#8211;reload \u767b\u5f55\u540e\u590d\u5236 \u4ee5\u4e0a\u547d\u4ee4\u5c06\u6c38\u4e45\u5f00\u653e80\u7aef\u53e3\uff0c\u652f\u6301TCP\u548cUDP\u534f\u8bae\u3002 \u5c4f\u853d\u4e0d\u9700\u8981\u7684\u7aef\u53e3\u4e3a\u4e86\u589e\u52a0\u670d\u52a1\u5668\u7684\u5b89\u5168\u6027\uff0c\u6211\u4eec\u53ef\u4ee5\u5c4f\u853d\u4e0d\u9700\u8981\u7684\u7aef\u53e3\uff0c\u4ee5\u9632\u6b62\u653b\u51fb\u8005\u5229\u7528\u5b83\u4eec\u8fdb\u884c\u653b\u51fb\u3002\u5728\u7ec8\u7aef\u4e2d\u8f93\u5165\u4ee5\u4e0b\u547d\u4ee4\u6765\u5c4f\u853d\u6307\u5b9a\u7684\u7aef\u53e3\uff0c\u4ee5\u793a\u4f8b\u7aef\u53e322\u4e3a\u4f8b\uff1a sudo firewall-cmd [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-61580","post","type-post","status-publish","format-standard","hentry","category-os"],"_links":{"self":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/61580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/comments?post=61580"}],"version-history":[{"count":0,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/61580\/revisions"}],"wp:attachment":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/media?parent=61580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/categories?post=61580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/tags?post=61580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}