From firewalld
manpage:
--reload
Reload firewall rules and keep state information. [...]
--complete-reload
Reload firewall completely, even netfilter kernel modules. This will
most likely terminate active connections, because state information is
lost. [...]
So doing firewall-cmd --complete-reload
would be a heavy method that does the trick. Actually it should not terminate established TCP connections which are still allowed in the new ruleset, thanks to net.netfilter.nf_conntrack_tcp_loose = 1
(they should go back through NEW->ESTABLISHED without connectivity loss).
But rather than this, it's easier to simply delete Netfilter's conntrack state with the dedicated tool: conntrack
(requires installing a package usually named conntrack or conntrack-tools).
conntrack -F
or doing it selectively (additional options like address ranges can make it more selective):
conntrack -D -p tcp --dport 443; conntrack -D -p tcp --dport 22