How are the zones in firewalld configured with respect to ICMP packets? Do they act differently for interfaces and sources?
1. How firewalld filter ICMP packets?
I would assume the main zones act as they are named,
drop : DROP block : REJECT trust : ACCEPT but how about the other zones? public, external, work, internal, home? Do they by default accept or reject ICMP packets?
2. Does this functionality differ depending on whether the zone is assigned by an interface vs by a source?
For instance, would there be a difference in terms of the source IP:172.28.0.2 in these two settings?
some-zone interfaces: eno1 sources: services: ssh ports: masquerade: no forward-ports: icmp-blocks: rich rules: vs
some-zone interfaces: sources: 172.28.0.0/16 services: ssh ports: masquerade: no forward-ports: icmp-blocks: rich rules: