- April 22, 2023
- 6:52 am
- No Comments
How to Set Up and Use a Basic Firewall on Linux
UFW (Uncomplicated Firewall) is a user-friendly front-end for managing iptables firewall rules on Linux systems. It simplifies the process of configuring and managing a firewall, making it suitable for beginners and advanced users alike. This guide will show you how to set up and use UFW to secure your Linux system.
Using UFW
Step 1: Open Terminal
Open the terminal by pressing Ctrl + Alt + T on your keyboard or by searching for it in the applications menu.
Step 2: Install UFW
UFW is usually installed by default on Ubuntu and its derivatives. If it’s not installed, you can install it using the package manager specific to your distribution:
On Debian/Ubuntu-based systems:
sudo apt update && sudo apt install ufw
On Fedora/RPM-based systems:
sudo dnf update && sudo dnf install ufw
On openSUSE systems:
sudo zypper install ufw
On Arch-based systems:
sudo pacman -Syu && sudo pacman -S ufw
Step 3: Enable UFW
Before enabling UFW, it’s a good idea to ensure that SSH connections are allowed to prevent being locked out of your system. To allow SSH connections, run:
sudo ufw allow ssh
Now, enable UFW by running:
sudo ufw enable
To check the status of UFW, run:
sudo ufw status verbose
Step 4: Configure UFW Rules
You can configure UFW rules to allow or deny traffic based on various criteria, such as port number, protocol, or IP address.
To allow traffic on a specific port, use the following command:
sudo ufw allow [port_number]
For example, to allow HTTP traffic on port 80:
sudo ufw allow 80
To deny traffic on a specific port, use the following command:
sudo ufw deny [port_number]
For example, to deny FTP traffic on port 21:
sudo ufw deny 21
You can also specify the protocol (TCP or UDP) when creating rules:
sudo ufw allow [port_number]/[protocol]
For example, to allow UDP traffic on port 53 (DNS):
sudo ufw allow 53/udp
Step 5: Delete UFW Rules
To delete a UFW rule, use the following command:
sudo ufw delete [rule]
For example, to delete the rule allowing HTTP traffic on port 80:
sudo ufw delete allow 80
Conclusion
UFW is a simple yet powerful tool for managing iptables firewall rules on Linux systems. By setting up and configuring UFW, you can enhance the security of your Linux system by controlling the traffic that enters and leaves your network.
Please Leave Feedback and Corrections in the Comments
More to Explore
Why MALIBAL?
When it comes to choosing a laptop, you have numerous options from well-known brands like Dell, HP, Lenovo, and Apple. Each of these companies offers a range of products designed to meet the diverse needs of their customers. However, if you’re looking for a brand that stands out in terms
How to Dual Boot Windows and Linux
Dual booting allows you to run two separate operating systems on a single computer, providing the flexibility to switch between different OS environments according to your needs. By setting up a dual-boot system with Windows and Linux, you can enjoy the robust performance and extensive software library of Windows alongside
MALIBAL Aon S1 Vs Apple MacBook Pro 13 (M2)
In the competitive landscape of high-performance, thin & light laptops, the MALIBAL Aon S1 and the Apple MacBook Pro 13 (M2) are noteworthy contenders.
How to Set Up a VPN Server on Linux
A VPN (Virtual Private Network) provides a secure, encrypted connection between your devices and the internet.
How to Install and Use a Terminal Multiplexer on Linux
A terminal multiplexer is a powerful command-line utility that enables users to manage multiple terminal sessions.
How to Set Up a Basic Samba Server on Linux
Samba is a popular open-source software suite that provides seamless file and print services to SMB/CIFS clients.
How to Create and Manage Users and Groups on Linux
User and group management is an essential aspect of maintaining a secure and organized Linux system.
How to Install and Configure a LAMP Stack on Linux
A LAMP stack is a popular software bundle consisting of Linux, Apache, MySQL, and PHP, used for hosting and deploying web applications.
How to Set Up and Use SSH Key Authentication on Linux
Secure Shell (SSH) is a widely used protocol for secure remote access and management of Linux servers.