search
HomeSystem TutorialLINUXHow to easily install and configure UFW firewall on your server

如何在服务器上轻松安装和配置 UFW 防火墙

When managing a server, the first thing that must be configured to reduce its security is to configure the firewall. Fortunately, Linux includes a default setting called Iptables, and many people find this firewall difficult to configure and manage. a little complicated. There are simpler alternatives available, such as UFW.

UFW is actually a CLI or command line interface containing Iptables Firewall for Linux, which provides us with an easier way to manage and configure Iptables. For UFW, there is even a GUI or graphical interface called GUFW that we can use on our desktop PC or laptop to manage and configure the firewall.

Install UFW on the server

To install ithow to view firewall in linux, just write the command to the terminal -

linuxidc@linuxidc:~/$sudoapt-getinstallufw

By default, UFW is disabled after installation How to view the firewall in linux, so we can use the command to view its status -

linuxidc@linuxidc:~/$sudoufwstatusverbose

Status: Inactive

Basic configuration of UFW

Some basic configurations we can use in UFW to secure our servers.

Default rules:

As the name suggests, check what kind of system Linux is. The default rules are a series of standard rules that are easy to configure the firewall. This type of rules allows us to specify whether to allow or deny incoming traffic or outgoing traffic, as well as some other rules.

In fact a particularly good configuration to use GUFW is almost never installed on a PC, it is to deny all incoming traffic and allow outgoing traffic.

We can adjust it using the following command:

linuxidc@linuxidc:~/$sudoufwdefaultdenyincoming

防火墙查看端口是否放开_防火墙查看命令_linux怎么查看防火墙

The default incoming policy is changed to "deny"

(Please update your firewall rules accordingly)

Deny all incoming traffic.

linuxidc@linuxidc:~/$sudoufwdefaultallowoutgoing

The default outgoing policy is changed to "allow"

(Please update your firewall rules accordingly)

With these two configurations, the PC can be well protected, and if we want to improve security, we can also deny outgoing traffic to obtain higher security. In fact, the disadvantage is what you must know The application requires an outbound traffic rule to function properly.

Allow connections:

Suppose we configure a firewall on the server and deny all incoming traffic. How do we connect to it remotely via SSH? We need to apply a rule that allows us to connect to port 22.

So we use the option allow and specify the ports we want to allow incoming traffic and the TCP contract they use:

linuxidc@linuxidc:~/$sudoufwallow22/tcp

Firewall rules updated

Rules updated (v6)

防火墙查看命令_防火墙查看端口是否放开_linux怎么查看防火墙

UFW comes with some preset rules that we can use by their name, for example, the previous command attempts to open port 22 which is known to be used as a port for SSH connections, this rule can also be enabled using the following command:

linuxidc@linuxidc:~/$sudoufwallowssh

Skip adding already existing rules

Skip adding already existing rules (v6)

In the same way, we can use other pre-built rules to handle known services, such as HTTP using port 80, HTTPS using port 443, etc.

Port range:

You may also want to allow not only incoming traffic to a port, but allow a range of incoming traffic within it, for example, a Mosh application may require a port range from port 60000 to the contracted 61000. Open udp.

We can apply it by entering the following command:

linuxidc@linuxidc:~/$sudoufwallow60000:61000/udp

Firewall rules updated

Rules updated (v6)

Connection refused:

In the same way we allow incoming connections, we can deny such connections.

linux怎么查看防火墙_防火墙查看命令_防火墙查看端口是否放开

Suppose we have a default rule that allows all incoming traffic (not recommended), but we only want to deny incoming traffic for a certain port, we can apply a configuration like this:

linuxidc@linuxidc:~/$sudoufwdeny22/tcp

Firewall rules updated

Rules updated (v6)

In the same way, we can deny a port range.

linuxidc@linuxidc:~/$sudoufwdeny60000:61000/udp

Firewall rules updated

Rules updated (v6)

Delete rules:

Assuming that we have configured the SSH server to use port 2222 instead of the originally opened port 22, we should delete the original rule that allows port 22. This can be done using the following command:

sudoufwdeleteallow22/tcp

In a similar form, if it were a series of ports, we could do this:

sudoufwdeleteallow60000:61000/udp

防火墙查看命令_防火墙查看端口是否放开_linux怎么查看防火墙

For example, if we have a set of rules perfected with UFW and we want to remove them but don't know how to perform the removal, since it is some kind of complex rules, we can enumerate them with the command:

linuxidc@linuxidc:~/$sudoufwstatusnumbered

Status:Activated

To action from

-----

[1]22/tcpDENYINAanywhere

[2]60000:61000/udpDENYINAnywhere

[3]22/tcp(v6)DENYINAnywhere(v6)

[4]60000:61000/udp(v6)DENYINAnywhere(v6)

Which will give us a set of numbering rules like this:

ufw rule status

As mentioned above, the rules are numbered so we can use that number to remove a specific rule:

linuxidc@linuxidc:~/$sudoufwdelete4

Soon to be deleted:

防火墙查看端口是否放开_防火墙查看命令_linux怎么查看防火墙

deny60000:61000/udp

Do you want to continue (y|n)? y

The rules have been deleted (v6)

Activate and deactivate UFW:

Once all the rules are configured and everything is correct, we will proceed to activate the firewall using the following command:

linuxidc@linuxidc:~/$sudoufwenable

With this, we will make UFW active and secure the connection using our specified rules.

If you want to disable UFW, please type the following command:

linuxidc@linuxidc:~/$sudoufwdisable

If for some reason you request to cancel all applicable rules-

linuxidc@linuxidc:~/$sudoufwreset

Summary

This is just some basic configuration of UFW through which we can add a good layer of security to our PCs and servers. There are also mid-level configurations that can be used to further increase security or perform certain tasks.

更多Linux指令相關資訊請見Linux指令大全專題頁面

Linux公社的RSS地址:

The above is the detailed content of How to easily install and configure UFW firewall on your server. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How does the availability of developer tools differ between Linux and Windows?How does the availability of developer tools differ between Linux and Windows?May 12, 2025 am 12:04 AM

Linuxoffersmoredevelopertools,especiallyopen-sourceandcommand-linebased,whileWindowshasimprovedwithWSLbutstilllagsinsomeareas.Linuxexcelsinopen-sourcetools,command-lineefficiency,andsystemoptimization,makingitidealfordevelopersfocusedontheseaspects.W

7 Windows-Like Linux Distros You Should Try Out7 Windows-Like Linux Distros You Should Try OutMay 11, 2025 am 10:35 AM

This article explores the best Linux distributions offering a Windows-like desktop experience. The shift from Windows, particularly from Windows 10 (released July 29, 2015) and its successor Windows 11 (October 5, 2021), is often considered by users

10 Best Open Source Security Firewalls for Linux10 Best Open Source Security Firewalls for LinuxMay 11, 2025 am 10:25 AM

As an administrator with more than ten years of experience in Linux management, my main responsibility is always the security management of Linux servers. Firewalls play a vital role in protecting Linux systems and network security. They are like security guards between internal and external networks, controlling and managing in and out of network traffic according to a set of predefined rules. These firewall rules allow legal connections and block unspecified connections. There are many open source firewall applications available these days, and choosing the right application for your needs can be challenging. In this article, we will explore the ten most popular open source firewalls that can help protect your Linux servers in 2024. Iptables /

7 Must-Try X-Window (GUI-Based) Linux Commands - Part 27 Must-Try X-Window (GUI-Based) Linux Commands - Part 2May 11, 2025 am 10:01 AM

This article explores additional valuable X-based Linux commands and programs, expanding on our previous coverage of GUI-based Linux commands. xwininfo: Unveiling Window Details xwininfo is a command-line utility providing comprehensive information

How to Monitor MySQL or MariaDB Using Netdata in LinuxHow to Monitor MySQL or MariaDB Using Netdata in LinuxMay 11, 2025 am 09:50 AM

Netdata: A powerful tool to easily monitor the performance of MySQL databases on Linux systems Netdata is a free and open source real-time system performance and health monitoring application suitable for Unix-like systems such as Linux, FreeBSD and macOS. It collects and visualizes various metrics, allowing you to monitor the system's operation in real time. Netdata supports a variety of plug-ins that can monitor the current system status, running applications and services, such as MySQL database servers, etc. This article will guide you on how to use Netdata to monitor the performance of MySQL database servers on RHEL-based distributions. After reading, you will be able to go through Netdata's web interface,

How to Compare and Merge Files Using diff3 Command on LinuxHow to Compare and Merge Files Using diff3 Command on LinuxMay 11, 2025 am 09:49 AM

Linux diff3 command: a powerful tool for comparing and merging three files The diff3 command is a powerful tool in Linux that compares three files and shows their differences. This is very useful for programmers and system administrators who often deal with multiple versions of the same file, needing to merge these versions or identify changes between different versions. This article will introduce the basic usage of the diff3 command, common options, and some examples to help you understand how it works in Linux. What is the diff3 command? diff3 is a tool for comparing three files line by line, which recognizes differences and displays them in an easy to understand format. It can be used for: Find three articles

How to Run an SMS Portal with playSMS in LinuxHow to Run an SMS Portal with playSMS in LinuxMay 11, 2025 am 09:41 AM

This guide provides a comprehensive walkthrough for installing the open-source SMS management software, playSMS, on a Linux server. It's a powerful tool for efficient SMS communication management. System Requirements: Before beginning, ensure your s

Clementine: A Feature-Rich Music Player for LinuxClementine: A Feature-Rich Music Player for LinuxMay 11, 2025 am 09:31 AM

Clementine: Your Versatile and User-Friendly Music Player for Linux, macOS, and Windows Clementine is a modern, lightweight music player designed for ease of use, particularly on Linux systems. Inspired by Amarok, Clementine surpasses its predecessor

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.