This program (UFW) is designed to make Linux firewalls easier to use and manage. (usually installed by default) UFW, like other Linux firewalls, uses iptable as a background.
Installation method:
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp;sudo apt install UFW
Usage (retell Chinese meaning)
[] represents the optional content. Root permissions may be required, such as failure to run, please use sudo ufw ... Command structure. The contents of "" cannot be copied and changed as needed.
UFW [--dry-run] Enable|disable|reload
command [-Test run] activate | close | reload
UFW [--dry-run] Default allow|deny|reject [incoming|outgoing]
command [--trial run] default allow | block | Deny access to native rules | Rules for outward access
Note: Reject lets visitors know that the data is rejected (feedback rejection information). Deny directly discards access to the data, and the visitor does not know whether the access is denied or the host is not present.
UFW [--dry-run] Logging on|off| Level
command [-Test run] Log on | close | "Level"
UFW [--dry-run] Reset
command [--trial run] Reset
UFW [--dry-run] status [verbose|numbered]
command [-Test run] status [detail | numbered rules]
UFW [--dry-run] Show
command [-Test run] Displays the report type
UFW [--dry-run] [delete] [insert NUM] allow|deny|reject|limit [In|out][log|log-all] port[/protocol]
command [--trial run] [delete] [before "x rule"] allow | block | deny | limit [Enter | out] [Record New Connection | Log all packets] "port" [/"agreement"]
UFW [--dry-run] [delete] [insert NUM] allow|deny|reject|limit [In|out on INTERFACE] [Log|log-all] [Proto Kyoto] [from address [Port Port]] [to address [port]]
command [-trial run] [delete] [insert to Rule X] allow | block | deny | [protocol Protocol] [source address [Port Port]] [destination address] [port Port]]
UFW [--dry-run] Delete NUM
command [-trial run] Delete "rule number X"
UFW [--dry-run] App List|info|default|update
command [-Test run] Program List | information | default | update