Bobcares

Centos Disable Firewall and SELinux | Tips

PDF Header PDF Footer

Learn how to disable Firewall and SELinux in CentOS with ease. Our Server Management Support team is here to help you with your questions and concerns.

CentOS Disable Firewall and SELinux | Tips

Security-Enhanced Linux, also known as SELinux offers a strong access control mechanism.

It is developed by the National Security Agency (NSA). SELinux enables sysadmins to fine-tune user and application access to resources. Furthermore, it boosts the overall security of a Linux server.

CentOS Disable Firewall and SELinux | Tips

Before we dive into the nitty-gritty of SELinux configurations, we have to disable both the firewall and SELinux temporarily.

So, to disable the firewall on boot, run this command:

# systemctl disable firewalld.service

To disable SELinux, we have to open the `/etc/selinux/config` file and change the line:

SELINUX=[...]

to

SELINUX=disabled

Now, we can check the status of SELinux with the following code:

  • # sestatus
  • # getenforce
  • # cat /etc/selinux/config

Understanding SELinux Modes

The `/etc/selinux/config` file acts as the control center for SELinux on the system. The `SELINUX=` line will have one of these three values:

  • Enforcing: SELinux security policy is enforced.
  • Disabled: SELinux policy is not loaded.
  • Permissive: SELinux prints warnings.

Furthermore, the `SELINUXTYPE=` line can have one of these values:

  • Targeted: Targeted processes are protected.
  • Minimum: Modification of targeted policy.
  • mls: Multi Level Security protection.

Our experts would like to point out that disabling SELinux is not a good idea due to potential security risks.

How to Modify SELinux Modes

We can easily change the SELinux mode with the setenforce command.

For example, we can put SELinux in enforcing mode as seen here:

$ sudo setenforce Enforcing
$ sestatus

Or

We can put SELinux in permissive (disabled) mode as seen here:

$ sudo setenforce Permissive
$ sestatus
$ getenforce

Furthermore, we can disable SELinux permanently by editing the `/etc/selinux/config` file:

$ sudo vi /etc/selinux/config

Then, set `SELINUX` to disabled:

SELINUX=disabled

After making the change, we have to save and close the file and reboot the Linux system.

We can check if SELinux has been disabled with these commands

$ getenforce
$ sestatus

As seen above, navigating through SELinux is a delicate balance between security and system functionality. While temporary measures may be needed in certain cases, a permanent solution must carefully consider the potential risks.

[Need assistance with a different issue? Our team is available 24/7.]

Conclusion

In brief, our Support Experts demonstrated how to disable Firewall and SELinux in CentOS with ease.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

server management

Spend time on your business, not on your servers.

TALK TO US

Or click here to learn more.

Speed issues driving customers away?
We’ve got your back!

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

_reb2bgeo - The visitor's geographical location

_reb2bloaded - Whether or not the script loaded for the visitor

_reb2bref - The referring URL for the visit

_reb2bsessionID - The visitor's RB2B session ID

_reb2buid - The visitor's RB2B user ID

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid
_reb2bgeo, _reb2bloaded, _reb2bref, _reb2bsessionID, _reb2buid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF