[root@localhost ~]# vi /etc/firewalld/firewalld.conf 
[root@localhost ~]# vi /etc/firewalld/zones/public.xml

<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>Public</short>
  <description>For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
  <service name="dhcpv6-client"/>
  <service name="ssh"/>
  <port protocol="tcp" port="3690"/>
</zone>



[root@localhost ~]# firewall-cmd --list-all
public (default, active)
  interfaces: eno16777736
  sources: 
  services: dhcpv6-client ssh
  ports: 443/tcp
  masquerade: no
  forward-ports: 
  icmp-blocks: 
  rich rules: 

[root@localhost ~]# firewall-cmd --permanent --zone=public --remove-port=443/tcp
success
[root@localhost ~]# firewall-cmd --permanent --zone=public --add-port=3690/tcp
success
[root@localhost ~]# firewall-cmd --list-all
public (default, active)
  interfaces: eno16777736
  sources: 
  services: dhcpv6-client ssh
  ports: 443/tcp
  masquerade: no
  forward-ports: 
  icmp-blocks: 
  rich rules: 

[root@localhost ~]# service firewalld stop
Redirecting to /bin/systemctl stop  firewalld.service
[root@localhost ~]# service firewalld start
Redirecting to /bin/systemctl start  firewalld.service
[root@localhost ~]# firewall-cmd --state
running
[root@localhost ~]# firewall-cmd --list-all
public (default, active)
  interfaces: eno16777736
  sources: 
  services: dhcpv6-client ssh
  ports: 3690/tcp
  masquerade: no
  forward-ports: 
  icmp-blocks: 
  rich rules: