the WLS instance uses Firewalld
Creating new rules with Firewalld:
firewall-cmd –add-forward-port=port=443:proto=tcp:toport=8181
firewall-cmd –add-forward-port=port=80:proto=tcp:toport=8080
firewall-cmd –runtime-to-permanent
systemctl restart firewalld
firewall-cmd –zone=public –list-all
Thus, the public zone now looks like:
# firewall-cmd –zone=public –list-all
public (active)
target: default
icmp-block-inversion: no
interfaces: ens3
sources:
services: dhcpv6-client ssh
ports: 8443/tcp
protocols:
masquerade: no
forward-ports: port=443:proto=tcp:toport=8181:toaddr=
port=80:proto=tcp:toport=8080:toaddr=
source-ports:
icmp-blocks:
rich rules:
Adding rules directly with iptables commands are not preserved by Firewalld – they need to be added to the Firewalld config. Seems to be ok now.