[root@node ~]# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all — 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ACCEPT all — 0.0.0.0/0 0.0.0.0/0
INPUT_direct all — 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES_SOURCE all — 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all — 0.0.0.0/0 0.0.0.0/0
DROP all — 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all — 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all — 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ACCEPT all — 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all — 0.0.0.0/0 0.0.0.0/0
FORWARD_IN_ZONES_SOURCE all — 0.0.0.0/0 0.0.0.0/0
FORWARD_IN_ZONES all — 0.0.0.0/0 0.0.0.0/0
FORWARD_OUT_ZONES_SOURCE all — 0.0.0.0/0 0.0.0.0/0
FORWARD_OUT_ZONES all — 0.0.0.0/0 0.0.0.0/0
DROP all — 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all — 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
OUTPUT_direct all — 0.0.0.0/0 0.0.0.0/0
Chain FORWARD_IN_ZONES (1 references)
target prot opt source destination
FWDI_public all — 0.0.0.0/0 0.0.0.0/0 [goto]
FWDI_public all — 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_IN_ZONES_SOURCE (1 references)
target prot opt source destination
Chain FORWARD_OUT_ZONES (1 references)
target prot opt source destination
FWDO_public all — 0.0.0.0/0 0.0.0.0/0 [goto]
FWDO_public all — 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_OUT_ZONES_SOURCE (1 references)
target prot opt source destination
Chain FORWARD_direct (1 references)
target prot opt source destination
Chain FWDI_public (2 references)
target prot opt source destination
FWDI_public_log all — 0.0.0.0/0 0.0.0.0/0
FWDI_public_deny all — 0.0.0.0/0 0.0.0.0/0
FWDI_public_allow all — 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0
Chain FWDI_public_allow (1 references)
target prot opt source destination
Chain FWDI_public_deny (1 references)
target prot opt source destination
Chain FWDI_public_log (1 references)
target prot opt source destination
Chain FWDO_public (2 references)
target prot opt source destination
FWDO_public_log all — 0.0.0.0/0 0.0.0.0/0
FWDO_public_deny all — 0.0.0.0/0 0.0.0.0/0
FWDO_public_allow all — 0.0.0.0/0 0.0.0.0/0
Chain FWDO_public_allow (1 references)
target prot opt source destination
Chain FWDO_public_deny (1 references)
target prot opt source destination
Chain FWDO_public_log (1 references)
target prot opt source destination
Chain INPUT_ZONES (1 references)
target prot opt source destination
IN_public all — 0.0.0.0/0 0.0.0.0/0 [goto]
IN_public all — 0.0.0.0/0 0.0.0.0/0 [goto]
Chain INPUT_ZONES_SOURCE (1 references)
target prot opt source destination
Chain INPUT_direct (1 references)
target prot opt source destination
Chain IN_public (2 references)
target prot opt source destination
IN_public_log all — 0.0.0.0/0 0.0.0.0/0
IN_public_deny all — 0.0.0.0/0 0.0.0.0/0
IN_public_allow all — 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp — 0.0.0.0/0 0.0.0.0/0
Chain IN_public_allow (1 references)
target prot opt source destination
ACCEPT tcp — 172.17.134.13 0.0.0.0/0 tcp dpt:2181 ctstate NEW
ACCEPT all — 172.17.134.13 0.0.0.0/0
ACCEPT all — 172.17.172.236 0.0.0.0/0
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 tcp dpt:8715 ctstate NEW
ACCEPT tcp — 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW
Chain IN_public_deny (1 references)
target prot opt source destination
Chain IN_public_log (1 references)
target prot opt source destination
Chain OUTPUT_direct (1 references)
target prot opt source destination
[root@node ~]# cat /etc/firewalld/zones/public.xml
<?xml version=”1.0″ encoding=”utf-8″?>
<zone>
<short>Public</short>
<description>For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
<service name=”ssh”/>
<service name=”dhcpv6-client”/>
<port protocol=”tcp” port=”8715″/>
<port protocol=”tcp” port=”80″/>
<rule family=”ipv4″>
<source address=”172.17.134.13″/>
<port protocol=”tcp” port=”2181″/>
<accept/>
</rule>
<rule family=”ipv4″>
<source address=”172.17.134.13″/>
<accept/>
</rule>
<rule family=”ipv4″>
<source address=”172.17.172.236″/>
<accept/>
</rule>
</zone>