trying to close two ports with firewalld, leaving everything else open

Is the infant mortality rate among African-American babies in Youngstown, Ohio greater than that of babies in Iran?

How much steel armor can you wear and still be able to swim?

Harmonic Series Phase Difference?

Fibonacci sequence and other metallic sequences emerged in the form of fractions

How to write a nice frame challenge?

What is "dot" sign in •NO?

How can I ping multiple IP addresses at the same time?

Do details of my undergraduate title matter?

How to make a villain when your PCs are villains?

I'm yearning in grey

How would Japanese people react to someone refusing to say “itadakimasu” for religious reasons?

Having some issue with notation in a Hilbert space

How to prevent cables getting intertwined

A medieval book with a redhead girl as a main character who allies with vampires and werewolves against scientific opposition

Can you place a web spell on a surface you cannot see?

If the mass of the Earth is decreasing by sending debris in space, does its angular momentum also decrease?

How can caller ID be faked?

Justifying Affordable Bespoke Spaceships

Why swap space doesn't get filesystem check at boot time?

How to use random to choose colors

I have found ports on my Samsung smart tv running a display service. What can I do with it?

Expand command in an argument before the main command

Are there any individual aliens that have gained superpowers in the Marvel universe?

Time at 1G acceleration to travel 100 000 light years



trying to close two ports with firewalld, leaving everything else open







.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I think I'm using the wrong technique, but not sure of the right one.



Machine: Red Hat release 7.2



firewalld.noarch: 0.3.9-14.el7



I've been asked to close two ports but insure that all other ports are open. The solution needs to be easy to turn on and off. To that end I have done:



  • bring up firewalld


  • set "trusted" as default zone # Trusted opens all ports


  • firewall-cmd --zone=trusted --add-interface=eno16780032 # only Ethernet interface on this server.


  • For testing purposes, executing nc -l port_number to have something answering on that port.


Test by: go to a different machine, execute "telnet machine_name port_number" and observe that I get a response. (Restarting nc after each test.)



Turn off port:



  • firewall-cmd --zone=trusted --remove-port port_number/tcp

Verify:



  • firewall-cmd --zone=trusted --query-port port_number/tcp

Returns "no"



At this point, nc should be listening on port_number, but it should be blocked by firewalld. I shouldn't be able to connect to it.



However, "telnet machine_name port_number" from a different machine still connects.



I'm not even trying to make it persistent at this point, just trying to get the rule to work. What am I doing wrong?



The application: We have a homegrown back end service that runs as a master/slave configuration. The slave is up at all times, to sync data with the master. Only the system designated "master" can be used by the front end. (To make it a true cluster would involve too much work, the developers tell me.)



There's a load balancer in "the cloud" (over which we don't have direct control) that points to both machines. The objective is to block two key ports on the slave so the load balancer always goes to the master. When we fail over, the ports on the "slave" (now master) are unblocked and the ports on the "master" (now slave) are blocked, forcing the load balancer to go to the new master.



This is probably not a good use of the load balancer or of firewalld, but it's an odd application and we're just trying to find something that works that doesn't involve either mucking with the load balancer or shutting down services on the slave.



Any ideas?










share|improve this question




























    0















    I think I'm using the wrong technique, but not sure of the right one.



    Machine: Red Hat release 7.2



    firewalld.noarch: 0.3.9-14.el7



    I've been asked to close two ports but insure that all other ports are open. The solution needs to be easy to turn on and off. To that end I have done:



    • bring up firewalld


    • set "trusted" as default zone # Trusted opens all ports


    • firewall-cmd --zone=trusted --add-interface=eno16780032 # only Ethernet interface on this server.


    • For testing purposes, executing nc -l port_number to have something answering on that port.


    Test by: go to a different machine, execute "telnet machine_name port_number" and observe that I get a response. (Restarting nc after each test.)



    Turn off port:



    • firewall-cmd --zone=trusted --remove-port port_number/tcp

    Verify:



    • firewall-cmd --zone=trusted --query-port port_number/tcp

    Returns "no"



    At this point, nc should be listening on port_number, but it should be blocked by firewalld. I shouldn't be able to connect to it.



    However, "telnet machine_name port_number" from a different machine still connects.



    I'm not even trying to make it persistent at this point, just trying to get the rule to work. What am I doing wrong?



    The application: We have a homegrown back end service that runs as a master/slave configuration. The slave is up at all times, to sync data with the master. Only the system designated "master" can be used by the front end. (To make it a true cluster would involve too much work, the developers tell me.)



    There's a load balancer in "the cloud" (over which we don't have direct control) that points to both machines. The objective is to block two key ports on the slave so the load balancer always goes to the master. When we fail over, the ports on the "slave" (now master) are unblocked and the ports on the "master" (now slave) are blocked, forcing the load balancer to go to the new master.



    This is probably not a good use of the load balancer or of firewalld, but it's an odd application and we're just trying to find something that works that doesn't involve either mucking with the load balancer or shutting down services on the slave.



    Any ideas?










    share|improve this question
























      0












      0








      0








      I think I'm using the wrong technique, but not sure of the right one.



      Machine: Red Hat release 7.2



      firewalld.noarch: 0.3.9-14.el7



      I've been asked to close two ports but insure that all other ports are open. The solution needs to be easy to turn on and off. To that end I have done:



      • bring up firewalld


      • set "trusted" as default zone # Trusted opens all ports


      • firewall-cmd --zone=trusted --add-interface=eno16780032 # only Ethernet interface on this server.


      • For testing purposes, executing nc -l port_number to have something answering on that port.


      Test by: go to a different machine, execute "telnet machine_name port_number" and observe that I get a response. (Restarting nc after each test.)



      Turn off port:



      • firewall-cmd --zone=trusted --remove-port port_number/tcp

      Verify:



      • firewall-cmd --zone=trusted --query-port port_number/tcp

      Returns "no"



      At this point, nc should be listening on port_number, but it should be blocked by firewalld. I shouldn't be able to connect to it.



      However, "telnet machine_name port_number" from a different machine still connects.



      I'm not even trying to make it persistent at this point, just trying to get the rule to work. What am I doing wrong?



      The application: We have a homegrown back end service that runs as a master/slave configuration. The slave is up at all times, to sync data with the master. Only the system designated "master" can be used by the front end. (To make it a true cluster would involve too much work, the developers tell me.)



      There's a load balancer in "the cloud" (over which we don't have direct control) that points to both machines. The objective is to block two key ports on the slave so the load balancer always goes to the master. When we fail over, the ports on the "slave" (now master) are unblocked and the ports on the "master" (now slave) are blocked, forcing the load balancer to go to the new master.



      This is probably not a good use of the load balancer or of firewalld, but it's an odd application and we're just trying to find something that works that doesn't involve either mucking with the load balancer or shutting down services on the slave.



      Any ideas?










      share|improve this question














      I think I'm using the wrong technique, but not sure of the right one.



      Machine: Red Hat release 7.2



      firewalld.noarch: 0.3.9-14.el7



      I've been asked to close two ports but insure that all other ports are open. The solution needs to be easy to turn on and off. To that end I have done:



      • bring up firewalld


      • set "trusted" as default zone # Trusted opens all ports


      • firewall-cmd --zone=trusted --add-interface=eno16780032 # only Ethernet interface on this server.


      • For testing purposes, executing nc -l port_number to have something answering on that port.


      Test by: go to a different machine, execute "telnet machine_name port_number" and observe that I get a response. (Restarting nc after each test.)



      Turn off port:



      • firewall-cmd --zone=trusted --remove-port port_number/tcp

      Verify:



      • firewall-cmd --zone=trusted --query-port port_number/tcp

      Returns "no"



      At this point, nc should be listening on port_number, but it should be blocked by firewalld. I shouldn't be able to connect to it.



      However, "telnet machine_name port_number" from a different machine still connects.



      I'm not even trying to make it persistent at this point, just trying to get the rule to work. What am I doing wrong?



      The application: We have a homegrown back end service that runs as a master/slave configuration. The slave is up at all times, to sync data with the master. Only the system designated "master" can be used by the front end. (To make it a true cluster would involve too much work, the developers tell me.)



      There's a load balancer in "the cloud" (over which we don't have direct control) that points to both machines. The objective is to block two key ports on the slave so the load balancer always goes to the master. When we fail over, the ports on the "slave" (now master) are unblocked and the ports on the "master" (now slave) are blocked, forcing the load balancer to go to the new master.



      This is probably not a good use of the load balancer or of firewalld, but it's an odd application and we're just trying to find something that works that doesn't involve either mucking with the load balancer or shutting down services on the slave.



      Any ideas?







      load-balancing firewalld master-slave firewall-cmd






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked May 31 at 19:22









      Ron ChristianRon Christian

      11




      11




















          1 Answer
          1






          active

          oldest

          votes


















          0














          IIRC the philosophy behind firewalld is to close anything and open just the ports you need. So just the inverse you are trying to do. Therefore commands like --add-port will add the port specified to be open.

          As an example, adding port 80 will just add another ACCEPT rule to iptables but since the target for the zone trusted is ACCEPT already, this rule just has no meaning.



          $ firewall-cmd --zone=trusted --add-port=80/tcp

          $ iptables -L -n | grep 80
          ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW


          Same if you remove the port with --remove-port, which should give a hint if the corresponding port is not configured.



          $ firewall-cmd --zone=trusted --remove-port 80/tcp
          success
          $ firewall-cmd --zone=trusted --remove-port 80/tcp
          Warning: NOT_ENABLED: '80:tcp' not in 'trusted'
          success



          firewalld also provides rich-rules which can be used for what you want to achieve.



          The command as follows would close port 80/tcp.



          firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" port port="80" protocol="tcp" reject'


          If you want to allow a single IP address to connect to that port, you could add a source.



          firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'


          The source parameter also accepts subnets in CIDR notation.



          firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.0/24" port port="80" protocol="tcp" reject'





          share|improve this answer























            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "2"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f969706%2ftrying-to-close-two-ports-with-firewalld-leaving-everything-else-open%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            IIRC the philosophy behind firewalld is to close anything and open just the ports you need. So just the inverse you are trying to do. Therefore commands like --add-port will add the port specified to be open.

            As an example, adding port 80 will just add another ACCEPT rule to iptables but since the target for the zone trusted is ACCEPT already, this rule just has no meaning.



            $ firewall-cmd --zone=trusted --add-port=80/tcp

            $ iptables -L -n | grep 80
            ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW


            Same if you remove the port with --remove-port, which should give a hint if the corresponding port is not configured.



            $ firewall-cmd --zone=trusted --remove-port 80/tcp
            success
            $ firewall-cmd --zone=trusted --remove-port 80/tcp
            Warning: NOT_ENABLED: '80:tcp' not in 'trusted'
            success



            firewalld also provides rich-rules which can be used for what you want to achieve.



            The command as follows would close port 80/tcp.



            firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" port port="80" protocol="tcp" reject'


            If you want to allow a single IP address to connect to that port, you could add a source.



            firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'


            The source parameter also accepts subnets in CIDR notation.



            firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.0/24" port port="80" protocol="tcp" reject'





            share|improve this answer



























              0














              IIRC the philosophy behind firewalld is to close anything and open just the ports you need. So just the inverse you are trying to do. Therefore commands like --add-port will add the port specified to be open.

              As an example, adding port 80 will just add another ACCEPT rule to iptables but since the target for the zone trusted is ACCEPT already, this rule just has no meaning.



              $ firewall-cmd --zone=trusted --add-port=80/tcp

              $ iptables -L -n | grep 80
              ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW


              Same if you remove the port with --remove-port, which should give a hint if the corresponding port is not configured.



              $ firewall-cmd --zone=trusted --remove-port 80/tcp
              success
              $ firewall-cmd --zone=trusted --remove-port 80/tcp
              Warning: NOT_ENABLED: '80:tcp' not in 'trusted'
              success



              firewalld also provides rich-rules which can be used for what you want to achieve.



              The command as follows would close port 80/tcp.



              firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" port port="80" protocol="tcp" reject'


              If you want to allow a single IP address to connect to that port, you could add a source.



              firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'


              The source parameter also accepts subnets in CIDR notation.



              firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.0/24" port port="80" protocol="tcp" reject'





              share|improve this answer

























                0












                0








                0







                IIRC the philosophy behind firewalld is to close anything and open just the ports you need. So just the inverse you are trying to do. Therefore commands like --add-port will add the port specified to be open.

                As an example, adding port 80 will just add another ACCEPT rule to iptables but since the target for the zone trusted is ACCEPT already, this rule just has no meaning.



                $ firewall-cmd --zone=trusted --add-port=80/tcp

                $ iptables -L -n | grep 80
                ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW


                Same if you remove the port with --remove-port, which should give a hint if the corresponding port is not configured.



                $ firewall-cmd --zone=trusted --remove-port 80/tcp
                success
                $ firewall-cmd --zone=trusted --remove-port 80/tcp
                Warning: NOT_ENABLED: '80:tcp' not in 'trusted'
                success



                firewalld also provides rich-rules which can be used for what you want to achieve.



                The command as follows would close port 80/tcp.



                firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" port port="80" protocol="tcp" reject'


                If you want to allow a single IP address to connect to that port, you could add a source.



                firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'


                The source parameter also accepts subnets in CIDR notation.



                firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.0/24" port port="80" protocol="tcp" reject'





                share|improve this answer













                IIRC the philosophy behind firewalld is to close anything and open just the ports you need. So just the inverse you are trying to do. Therefore commands like --add-port will add the port specified to be open.

                As an example, adding port 80 will just add another ACCEPT rule to iptables but since the target for the zone trusted is ACCEPT already, this rule just has no meaning.



                $ firewall-cmd --zone=trusted --add-port=80/tcp

                $ iptables -L -n | grep 80
                ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW


                Same if you remove the port with --remove-port, which should give a hint if the corresponding port is not configured.



                $ firewall-cmd --zone=trusted --remove-port 80/tcp
                success
                $ firewall-cmd --zone=trusted --remove-port 80/tcp
                Warning: NOT_ENABLED: '80:tcp' not in 'trusted'
                success



                firewalld also provides rich-rules which can be used for what you want to achieve.



                The command as follows would close port 80/tcp.



                firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" port port="80" protocol="tcp" reject'


                If you want to allow a single IP address to connect to that port, you could add a source.



                firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'


                The source parameter also accepts subnets in CIDR notation.



                firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.1" port port="80" protocol="tcp" reject'firewall-cmd --zone=trusted --add-rich-rule='rule family="ipv4" source NOT address="192.168.122.0/24" port port="80" protocol="tcp" reject'






                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Jun 1 at 9:39









                ThomasThomas

                3,33841525




                3,33841525



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Server Fault!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f969706%2ftrying-to-close-two-ports-with-firewalld-leaving-everything-else-open%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

                    Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

                    Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020