Install, enable, and view the status of the ubuntu default Firewall

Source: Internet
Author: User

Ubuntu 9.10 uses the UFW firewall by default and supports interface operations. Run the ufw command on the command line to see a series of operations that can be performed.

The simplest operation: sudo ufw status can check the Firewall status, and my return is: no activity

Sudo ufw version firewall version:
Ufw 0.29-4ubuntu1
Copyright 2008-2009 Canonical Ltd.

Ufw is installed in ubuntu by default.

1. Install

Sudo apt-get install ufw

2. Enable

Sudo ufw enable

Sudo ufw default deny

After running the preceding two commands, the firewall is enabled and automatically enabled when the system starts. Disable all external access to the local machine, but the local access to the external is normal.

3. enable/disable

Sudo ufw allow | deny [service]

Open or close a port, for example:

Sudo ufw allow smtp allows all external IP addresses to access the local port 25/tcp (smtp ).

Sudo ufw allow 22/tcp allows all external IP addresses to access the local port 22/tcp (ssh)

Sudo ufw allow 53 allows external access to port 53 (tcp/udp)

Sudo ufw allow from 192.168.1.100 allows this IP address to access all local ports

Sudo ufw allow proto udp 192.168.0.1 port 53 to 192.168.0.2 port 53

Sudo ufw deny smtp prohibit external access to the smtp service

Sudo ufw delete allow smtp delete a rule created above

4. view the Firewall Status

Sudo ufw status

For general users, only the following settings are required:

Sudo apt-get install ufw

Sudo ufw enable

Sudo ufw default deny

The preceding three commands are safe enough. If you need to open some services, use sudo ufw allow.

Enable/disable firewall ('disable' is set by default ')

Sudo ufw enable | disable

Change log status

Sudo ufw logging on | off

Set the Default policy (for example, "mostly open" vs "mostly closed ")

Sudo ufw default allow | deny

Allow or shield the port (you can view the service list in "status ). You can use "Protocol: Port" to specify a service name that exists in/etc/services, or use the meta-data package. The 'allow' parameter adds the entries to/etc/ufw/maps, while the 'deny' parameter is the opposite. The basic syntax is as follows:

Sudo ufw allow | deny [service]

Display the listening status of the firewall and port. For more information, see/var/lib/ufw/maps. The numbers in the brackets are not displayed.

Sudo ufw status

UFW usage example:

Allow port 53

$ Sudo ufw allow 53

Disable port 53

$ Sudo ufw delete allow 53

Allow port 80

$ Sudo ufw allow 80/tcp

Disable port 80

$ Sudo ufw delete allow 80/tcp

Allow smtp Port

$ Sudo ufw allow smtp

Delete the smtp port license

$ Sudo ufw delete allow smtp

Allow a specific IP Address

$ Sudo ufw allow from 192.168.254.254

Delete the preceding rule

$ Sudo ufw delete allow from 192.168.254.254

Linux 2.4 kernel later provides a very good firewall tool: netfilter/iptables, which is free and powerful and can be used to refine the inbound and outbound information, it can implement functions such as firewall, NAT (Network Address Translation), and packet segmentation. Netfilter works inside the kernel, while iptables allows you to define the table structure of the rule set.

However, iptables rules are a little "complicated", so ubuntu provides the ufw setting tool to simplify some iptables settings, and its background is still iptables. Ufw is short for uncomplicated firewall. For some complicated settings, you still need to go to iptables.

Ufw-related files and folders include:

/Etc/ufw/: contains some ufw environment configuration files, such as before. rules, after. rules, sysctl. conf, ufw. conf, before6.rule of for ip6, and after6.rules. These files are generally OK according to the default settings.

If ufw is enabled,/etc/ufw/sysctl. conf will overwrite the default/etc/sysctl. conf file, if your original/etc/sysctl. conf has been modified. After ufw is started, If/etc/ufw/sysctl. if there is a new value in conf, it overwrites/etc/sysctl. conf, otherwise/etc/sysctl. conf. Of course, you can modify the "IPT_SYSCTL =" entry in/etc/default/ufw to set which sysctrl. conf to use.

/Var/lib/ufw/user. the rules file contains some of the firewall rules we have set. You can see the rules when you open the file. Sometimes you can directly modify the file without using commands. After modification, remember that ufw reload is restarted to make the new rule take effect.

Below are some examples of ufw command line:

Ufw enable/disable: enable/disable ufw

Ufw status: view the defined ufw rules

Ufw default allow/deny: allow/deny external access by default

Ufw allow/deny 20: allow/deny access to port 20. After Port 20, it can be followed by/tcp or/udp, indicating tcp or udp packets.

Ufw allow/deny servicename: ufw finds the port of the corresponding service from/etc/services and filters out the port.

Ufw allow proto tcp from 10.0.1.0/10 to local ip port 25: allow tcp packets from 10.0.1.0/10 to access port 25 of the local machine.

Ufw delete allow/deny 20: delete the previously defined rule "allow/deny access to port 20"

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.