Hey everyone!
I was looking for some clarification regarding firewalld configuration to forward/filter traffic between two interfaces on a node.
I have a node with one interface on a public network, and a second interface on a private cluster network. I saw in a previous post on these forums (Configure firewalld for routing traffic between internal and external) that you can use a policy with an ingress and egress zone to accomplish this.
I did a mock of this configuration on my node and have the following:
[]# firewall-cmd --policy=internal-external --list-all
internal-external (active)
priority: -1
target: CONTINUE
ingress-zones: public
egress-zones: cluster_internal
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
My question is, with this configuration, where do the firewalld rules/filters get applied? I.e. if I want to allow a source coming in from the public interface access to the internal cluster network, would I add that source to the public egress-zone? To the ingress-zone? Both? Let me know if I can provide any further clarification or details about the setup.
–Thanks!