Information
firewalld zones represent a concept to manage incoming traffic more transparently. The zones are connected to networking interfaces or assigned a range of source addresses. You manage firewall rules for each zone independently, which enables you to define complex firewall settings and apply them to the traffic
Assigning a network interface to a firewalld zone is crucial for applying specific, tailored security policies based on the trust level of the network (e.g., public, home, work). This practice controls traffic flow by determining which rules, services, and ports are allowed or blocked, preventing uncontrolled access.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Run the following command to add the network interface(s) to a firewalld zone:
# firewall-cmd --permanent --zone={ZONE_NAME} --add-interface={INTERFACE}
Example:
# firewall-cmd --zone=public --add-interface=eth0 --permanent
Note: The zone assignment in the example is the zone public . Interfaces should be assigned to the appropriate zone following local site policy.