Merge pull request #12840 from lujun9972/add-MjAxOTAzMTkgSG93IFRvIFNldCBVcCBhIEZpcmV3YWxsIHdpdGggR1VGVyBvbiBMaW51eC5tZAo=

选题: 20190319 How To Set Up a Firewall with GUFW on Linux
This commit is contained in:
Xingyu.Wang 2019-03-20 21:24:02 +08:00 committed by GitHub
commit 79729b16ca
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,365 @@
[#]: collector: (lujun9972)
[#]: translator: ( )
[#]: reviewer: ( )
[#]: publisher: ( )
[#]: url: ( )
[#]: subject: (How To Set Up a Firewall with GUFW on Linux)
[#]: via: (https://itsfoss.com/set-up-firewall-gufw)
[#]: author: (Sergiu https://itsfoss.com/author/sergiu/)
How To Set Up a Firewall with GUFW on Linux
======
**UFW (Uncomplicated Firewall)** is a simple to use firewall utility with plenty of options for most users. It is an interface for the **iptables** , which is the classic (and harder to get comfortable with) way to set up rules for your network.
**Do you really need a firewall for desktop?**
![][1]
A **[firewall][2]** is a way to regulate the incoming and outgoing traffic on your network. A well-configured firewall is crucial for the security of servers.
But what about normal, desktop users? Do you need a firewall on your Linux system? Most likely you are connected to internet via a router linked to your internet service provider (ISP). Some routers already have built-in firewall. On top of that, your actual system is hidden behind NAT. In other words, you probably have a security layer when you are on your home network.
Now that you know you should be using a firewall on your system, lets see how you can easily install and configure a firewall on Ubuntu or any other Linux distribution.
### Setting Up A Firewall With GUFW
**[GUFW][3]** is a graphical utility for managing [Uncomplicated Firewall][4] ( **UFW** ). In this guide, Ill go over configuring a firewall using **GUFW** that suits your needs, going over the different modes and rules.
But first, lets see how to install GUFW.
#### Installing GUFW on Ubuntu and other Linux
GUFW is available in all major Linux distributions. I advise using your distributions package manager for installing GUFW.
If you are using Ubuntu, make sure you have the Universe Repository enabled. To do that, open up a terminal (default hotkey**:** CTRL+ALT+T) and enter:
```
sudo add-apt-repository universe
sudo apt update -y
```
Now you can install GUFW with this command:
```
sudo apt install gufw -y
```
Thats it! If you prefer not touching the terminal, you can install it from the Software Center as well.
Open Software Center and search for **gufw** and click on the search result.
![Search for gufw in software center][5]
Go ahead and click **Install**.
![Install GUFW from the Software Center][6]
To open **gufw** , go to your menu and search for it.
![Start GUFW][7]
This will open the firewall application and youll be greeted by a “ **Getting Started** ” section.
![GUFW Interface and Welcome Screen][8]
#### Turn on the firewall
The first thing to notice about this menu is the **Status** toggle. Pressing this button will turn on/off the firewall ( **default:** off), applying your preferences (policies and rules).
![Turn on the firewall][9]
If turned on, the shield icon turn from grey to colored. The colors, as noted later in this article, reflect your policies. This will also make the firewall **automatically start** on system startup.
**Note:** _**Home** will be turned **off** by default. The other profiles (see next section) will be turned **on.**_
#### Understanding GUFW and its profiles
As you can see in the menu, you can select different **profiles**. Each profile comes with different **default policies**. What this means is that they offer different behaviors for incoming and outgoing traffic.
The **default profiles** are:
* Home
* Public
* Office
You can select another profile by clicking on the current one ( **default: Home** ).
![][10]
Selecting one of them will modify the default behavior. Further down, you can change Incoming and Outgoing traffic preferences.
By default, both in **Home** and in **Office** , these policies are **Deny Incoming** and **Allow Outgoing**. This enables you to use services such as http/https without letting anything get in ( **e.g.** ssh).
For **Public** , they are **Reject Incoming** and **Allow Outgoing**. **Reject** , similar to **deny** , doesnt let services in, but also sends feedback to the user/service that tried accessing your machine (instead of simply dropping/hanging the connection).
Note
If you are an average desktop user, you can stick with the default profiles. Youll have to manually change the profiles if you change the network.
So if you are travelling, set the firewall on public profile and the from here forwards, firewall will be set in public mode on each reboot.
#### Configuring firewall rules and policies [for advanced users]
All profiles use the same rules, only the policies the rules build upon will differ. Changing the behavior of a policy ( **Incoming/Outgoing** ) will apply the changes to the selected profile.
Note that the policies can only be changed while the firewall is active (Status: ON).
Profiles can easily be added, deleted and renamed from the **Preferences** menu.
##### Preferences
In the top bar, click on **Edit**. Select **Preferences**.
![Open Preferences Menu in GUFW][11]
This will open up the **Preferences** menu.
![][12]
Lets go over the options you have here!
**Logging** means exactly what you would think: how much information does the firewall write down in the log files.
The options under **Gufw** are quite self-explanatory.
In the section under **Profiles** is where we can add, delete and rename profiles. Double-clicking on a profile will allow you to **rename** it. Pressing **Enter** will complete this process and pressing **Esc** will cancel the rename.
![][13]
To **add** a new profile, click on the **+** under the list of profiles. This will add a new profile. However, it wont notify you about it. Youll also have to scroll down the list to see the profile you created (using the mouse wheel or the scroll bar on the right side of the list).
**Note:** _The newly added profile will **Deny Incoming** and **Allow Outgoing** traffic._
![][14]
Clicking a profile highlight that profile. Pressing the **** button will **delete** the highlighted profile.
![][15]
**Note:** _You cant rename/remove the currently selected profile_.
You can now click on **Close**. Next, Ill go into setting up different **rules**.
##### Rules
Back to the main menu, somewhere in the middle of the screen you can select different tabs ( **Home, Rules, Report, Logs)**. We already covered the **Home** tab (thats the quick guide you see when you start the app).
![][16]
Go ahead and select **Rules**.
![][17]
This will be the bulk of your firewall configuration: networking rules. You need to understand the concepts UFW is based on. That is **allowing, denying, rejecting** and **limiting** traffic.
**Note:** _In UFW, the rules apply from top to bottom (the top rules take effect first and on top of them are added the following ones)._
**Allow, Deny, Reject, Limit:**These are the available policies for the rules youll add to your firewall.
Lets see exactly what each of them means:
* **Allow:** allows any entry traffic to a port
* **Deny:** denies any entry traffic to a port
* **Reject:** denies any entry traffic to a port and informs the requester about the rejection
* **Limit:** denies entry traffic if an IP address has attempted to initiate 6 or more connections in the last 30 seconds
##### Adding Rules
There are three ways to add rules in GUFW. Ill present all three methods in the following section.
**Note:** _After you added the rules, changing their order is a very tricky process and its easier to just delete them and add them in the right order._
But first, click on the **+** at the bottom of the **Rules** tab.
![][18]
This should open a pop-up menu ( **Add a Firewall Rule** ).
![][19]
At the top of this menu, you can see the three ways you can add rules. Ill guide you through each method i.e. **Preconfigured, Simple, Advanced**. Click to expand each section.
**Preconfigured Rules**
This is the most beginner-friendly way to add rules.
The first step is choosing a policy for the rule (from the ones detailed above).
![][20]
The next step is to choose the direction the rule will affect ( **Incoming, Outgoing, Both** ).
![][21]
The **Category** and **Subcategory** choices are plenty. These narrow down the **Applications** you can select
Choosing an **Application** will set up a set of ports based on what is needed for that particular application. This is especially useful for apps that might operate on multiple ports, or if you dont want to bother with manually creating rules for handwritten port numbers.
If you wish to further customize the rule, you can click on the **orange arrow icon**. This will copy the current settings (Application with its ports etc.) and take you to the **Advanced** rule menu. Ill cover that later in this article.
For this example, I picked an **Office Database** app: **MySQL**. Ill deny all incoming traffic to the ports used by this app.
To create the rule, click on **Add**.
![][22]
You can now **Close** the pop-up (if you dont want to add any other rules). You can see that the rule has been successfully added.
![][23]
The ports have been added by GUFW, and the rules have been automatically numbered. You may wonder why are there two new rules instead of just one; the answer is that UFW automatically adds both a standard **IP** rule and an **IPv6** rule.
**Simple Rules**
Although setting up preconfigured rules is nice, there is another easy way to add a rule. Click on the **+** icon again and go to the **Simple** tab.
![][24]
The options here are straight forward. Enter a name for your rule and select the policy and the direction. Ill add a rule for rejecting incoming SSH attempts.
![][25]
The **Protocols** you can choose are **TCP, UDP** or **Both**.
You must now enter the **Port** for which you want to manage the traffic. You can enter a **port number** (e.g. 22 for ssh), a **port range** with inclusive ends separated by a **:** ( **colon** ) (e.g. 81:89) or a **service name** (e.g. ssh). Ill use **ssh** and select **both TCP and UDP** for this example. As before, click on **Add** to completing the creation of your rule. You can click the **red arrow icon** to copy the settings to the **Advanced** rule creation menu.
![][26]
If you select **Close** , you can see that the new rule (along with the corresponding IPv6 rule) has been added.
![][27]
**Advanced Rules**
Ill now go into how to set up more advanced rules, to handle traffic from specific IP addresses and subnets and targeting different interfaces.
Lets open up the **Rules** menu again. Select the **Advanced** tab.
![][28]
By now, you should already be familiar with the basic options: **Name, Policy, Direction, Protocol, Port**. These are the same as before.
![][29]
**Note:** _You can choose both a receiving port and a requesting port._
What changes is that now you have additional options to further specialize our rules.
I mentioned before that rules are automatically numbered by GUFW. With **Advanced** rules you specify the position of your rule by entering a number in the **Insert** option.
**Note:** _Inputting **position 0** will add your rule after all existing rules._
**Interface** lets you select any network interface available on your machine. By doing so, the rule will only have effect on traffic to and from that specific interface.
**Log** changes exactly that: what will and what wont be logged.
You can also choose IPs for the requesting and for the receiving port/service ( **From** , **To** ).
All you have to do is specify an **IP address** (e.g. 192.168.0.102) or an entire **subnet** (e.g. 192.168.0.0/24 for IPv4 addresses ranging from 192.168.0.0 to 192.168.0.255).
In my example, Ill set up a rule to allow all incoming TCP SSH requests from systems on my subnet to a specific network interface of the machine Im currently running. Ill add the rule after all my standard IP rules, so that it takes effect on top of the other rules I have set up.
![][30]
**Close** the menu.
![][31]
The rule has been successfully added after the other standard IP rules.
##### Edit Rules
Clicking a rule in the rules list will highlight it. Now, if you click on the **little cog icon** at the bottom, you can **edit** the highlighted rule.
![][32]
This will open up a menu looking something like the **Advanced** menu I explained in the last section.
![][33]
**Note:** _Editing any options of a rule will move it to the end of your list._
You can now ether select on **Apply** to modify your rule and move it to the end of the list, or hit **Cancel**.
##### Delete Rules
After selecting (highlighting) a rule, you can also click on the **** icon.
![][34]
##### Reports
Select the **Report** tab. Here you can see services that are currently running (along with information about them, such as Protocol, Port, Address and Application name). From here, you can **Pause Listening Report (Pause Icon)** or **Create a rule from a highlighted service from the listening report (+ Icon)**.
![][35]
##### Logs
Select the **Logs** tab. Here is where youll have to check for any errors are suspicious rules. Ive tried creating some invalid rules to show you what these might look like when you dont know why you cant add a certain rule. In the bottom section, there are two icons. Clicking the **first icon copies the logs** to your clipboard and clicking the **second icon** **clears the log**.
![][36]
### Wrapping Up
Having a firewall that is properly configured can greatly contribute to your Ubuntu experience, making your machine safer to use and allowing you to have full control over incoming and outgoing traffic.
I have covered the different uses and modes of **GUFW** , going into how to set up different rules and configure a firewall to your needs. I hope that this guide has been helpful to you.
If you are a beginner, this should prove to be a comprehensive guide; even if you are more versed in the Linux world and maybe getting your feet wet into servers and networking, I hope you learned something new.
Let us know in the comments if this article helped you and why did you decide a firewall would improve your system!
--------------------------------------------------------------------------------
via: https://itsfoss.com/set-up-firewall-gufw
作者:[Sergiu][a]
选题:[lujun9972][b]
译者:[译者ID](https://github.com/译者ID)
校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
[a]: https://itsfoss.com/author/sergiu/
[b]: https://github.com/lujun9972
[1]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/firewall-linux.png?resize=800%2C450&ssl=1
[2]: https://en.wikipedia.org/wiki/Firewall_(computing)
[3]: http://gufw.org/
[4]: https://en.wikipedia.org/wiki/Uncomplicated_Firewall
[5]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/ubuntu_software_gufw-1.jpg?ssl=1
[6]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/ubuntu_software_install_gufw.jpg?ssl=1
[7]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/show_applications_gufw.jpg?ssl=1
[8]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw.jpg?ssl=1
[9]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_toggle_status.jpg?ssl=1
[10]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_select_profile-1.jpg?ssl=1
[11]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_open_preferences.jpg?ssl=1
[12]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_preferences.png?fit=800%2C585&ssl=1
[13]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_rename_profile.png?fit=800%2C551&ssl=1
[14]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_add_profile.png?ssl=1
[15]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_delete_profile.png?ssl=1
[16]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_home_tab.png?ssl=1
[17]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_rules_tab.png?ssl=1
[18]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_add_rule.png?ssl=1
[19]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_add_rules_menu.png?ssl=1
[20]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_preconfigured_rule_policy.png?ssl=1
[21]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_preconfigured_rule_direction.png?ssl=1
[22]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_preconfigured_add_rule.png?ssl=1
[23]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_preconfigured_rule_added.png?ssl=1
[24]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_add_simple_rules_menu.png?ssl=1
[25]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_simple_rule_name_policy_direction.png?ssl=1
[26]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_add_simple_rule.png?ssl=1
[27]: https://i2.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_simple_rule_added.png?ssl=1
[28]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_add_advanced_rules_menu.png?ssl=1
[29]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_advanced_rule_basic_options.png?ssl=1
[30]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_add_advanced_rule.png?ssl=1
[31]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_advanced_rule_added.png?ssl=1
[32]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_edit_highlighted_rule.png?ssl=1
[33]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_edit_rule_menu.png?ssl=1
[34]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_delete_rule.png?ssl=1
[35]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_report_tab.png?ssl=1
[36]: https://i0.wp.com/itsfoss.com/wp-content/uploads/2019/03/gufw_log_tab-1.png?ssl=1
[37]: https://i1.wp.com/itsfoss.com/wp-content/uploads/2019/03/firewall-linux.png?fit=800%2C450&ssl=1