I want to drop incoming communication unless it's from few IP adresses. Is it corect to put interface in one zone (drop) and drop everything (dont configure any services or ports...) and put those few allowed ip addresses to another zone (public) and alow only allowed ports for them? There will be no interface in zone public, only those ip adresses in source. Here is example:
[root@localhost]# firewall-cmd --list-all
drop (active)
target: default
icmp-block-inversion: no
interfaces: eth0
sources:
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
[root@localhost]# firewall-cmd --list-all --zone=public
public (active)
target: default
icmp-block-inversion: no
interfaces:
sources: 192.168.1.1
services:
ports: 443/tcp 443/udp
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules: