This article is collected by lkxed.

This commit is contained in:
六开箱 2022-11-26 23:19:54 +08:00
parent b87e40c6df
commit ee1225716a

View File

@ -0,0 +1,337 @@
[#]: subject: "Using Firewall With UFW in Ubuntu Linux [Beginners Guide]"
[#]: via: "https://itsfoss.com/ufw-ubuntu/"
[#]: author: "Abhishek Prakash https://itsfoss.com/"
[#]: collector: "lkxed"
[#]: translator: " "
[#]: reviewer: " "
[#]: publisher: " "
[#]: url: " "
Using Firewall With UFW in Ubuntu Linux [Beginners Guide]
======
UFW (Uncomplicated Firewall) is a simple-to-use firewall utility with plenty of options for all kinds of users.
It is actually an interface for iptables, which is the classic low-level tool (and harder to get comfortable with) to set up rules for your network.
### Why should you use a Firewall?
A firewall is a way to regulate the incoming and outgoing traffic on your network. This is crucial for servers, but it also makes a regular users system much safer, giving you control. If you are one of those people who like to keep things under control on an advanced level even on the desktop, you may consider setting up a firewall.
In short, the firewall is a must for servers. On desktops, it is up to you if you want to set it up.
### Setting up a firewall with UFW
It is important to properly set up firewalls. An incorrect setup may leave the server inaccessible if you are doing it for a remote Linux system, like a cloud or VPS server. For example, you block all incoming traffic on the server you are accessing via SSH. Now you wont be able to access the server via SSH.
In this tutorial, Ill go over configuring a firewall that suits your needs, giving you an overview of what can be done using this simple utility. This should be suitable for both [Ubuntu server and desktop users][1].
Please note that Ill be using the command line method here. There is a GUI frontend called [Gufw][2] for desktop users but I wont be covering it in this tutorial. There is a dedicated [guide to Gufw][3] if you want to use that.
#### Install UFW
If you are using Ubuntu, [UFW][4] should already be installed. If not, you can install it using the following command:
```
sudo apt install ufw
```
For other distributions, please use your package manager for installing UFW.
To check that UFW is properly installed, enter:
```
ufw --version
```
If it is installed, you should see the version details:
```
[email protected]:~$ ufw --version
ufw 0.36.1
Copyright 2008-2021 Canonical Ltd.
```
Great! So you have UFW on your system. Lets see about using it now.
**Note: You need to use sudo or be root to run (almost) all the ufw commands.**
#### Check ufw status and rules
UFW works by setting up rules for incoming and outgoing traffic. These rules consist of **allowing** and **denying** specific sources and destinations.
You can check the firewall rules by using the following command:
```
sudo ufw status
```
This should give you the following output at this stage:
```
Status: inactive
```
The above command would have shown you the firewall rules if the firewall was enabled. By default, UFW is not enabled and doesnt affect your network. Well take care of that in the next section.
![check ufw status][5]
But heres the thing, you can see and modify the firewall rules even ufw is not enabled.
```
sudo ufw show added
```
And in my case, it showed this result:
```
[email protected]:~$ sudo ufw show added
Added user rules (see 'ufw status' for running firewall):
ufw allow 22/tcp
[email protected]:~$
```
Now, I dont remember if I added this rule manually or not. Its not a fresh system.
#### Default policies
By default, UFW denies all incoming and allows all outgoing traffic. This behavior makes perfect sense for the average desktop user, since you want to be able to connect to various services (such as http/https to access web pages) and dont want to have anyone connect to your machine.
However, **if you are using a remote server, you must allow traffic on the SSH port** so that you can connect to the system remotely.
You can either allow traffic on SSH default port 22:
```
sudo ufw allow 22
```
In case you are using SSH on some other port, allow it at the service level:
```
sudo ufw allow ssh
```
Do note that the firewall is not active yet. This is a good thing. You can modify rules before you enable ufw so that essential services are not impacted.
If you are going to use UFW a production server, please ensure to [allow ports through UFW][6] for the running services.
For example, web servers usually use port 80, so use “sudo ufw allow 80”. You may also do it at service level “sudo ufw allow apache”.
This onus lies on your side and it is your responsibility to ensure your server runs properly.
For **desktop users**, you can go ahead with the default policies.
```
sudo ufw default deny incoming
sudo ufw default allow outgoing
```
#### Enable and disable UFW
For UFW to work, you have to enable it:
```
sudo ufw enable
```
Doing so will start the firewall and schedule it to start every time you boot up. You receive the following message:
```
Firewall is active and enabled on system startup.
```
**Again**: _if you are connected to a machine via ssh, make sure ssh is allowed before enabling ufw by entering_**sudo ufw allow ssh**_._
If you want to turn UFW off, type in:
```
sudo ufw disable
```
Youll get back:
```
Firewall stopped and disabled on system startup
```
#### Reload firewall for new rules
If UFW is already enabled and you modify the firewall rules, you need to reload it before the changes take into effect.
You can restart UFW by disabling it and enabling it again:
```
sudo ufw disable && sudo ufw enable
```
Or **reload** the rules:
```
sudo ufw reload
```
#### Reset to default firewall rules
If at any time you screw up any of your rules and want to return to the default rules (that is, no exceptions for allowing incoming or denying outgoing traffic), you can start it afresh with:
```
sudo ufw reset
```
**_Keep in mind that this will delete all your firewall configs._**
### Configuring firewall with UFW (more detailed view)
Alright! So you have learned most of the basic ufw commands. At this stage, I would prefer to go a bit in more detail on the firewall rule configuration.
#### Allow and deny by protocol and ports
This is how you add new exceptions to your firewall; **allow** enables your machine to receive data from the specified service, while **deny** does the opposite
By default, these commands will add rules for both **IP** and **IPv6**. If youd like to modify this behavior, youll have to edit **/etc/default/ufw**. Change
```
IPV6=yes
```
to
```
IPV6=no
```
That being said, the basic commands are:
```
sudo ufw allow <port>/<optional: protocol>
sudo ufw deny <port>/<optional: protocol>
```
If the rule was successfully added, youll get back:
```
Rules updated
Rules updated (v6)
```
For example:
```
sudo ufw allow 80/tcp
sudo ufw deny 22
sudo ufw deny 443/udp
```
**Note:**_if you dont include a specific protocol, the rule will be applied for both **tcp** and **udp**._
If you enable(or, if already running, reload) UFW and check out its status, you can see that the new rules have been successfully applied.
![UFW Ports][7]
You can also allow/deny **port ranges**. For this type of rule, you must specify the protocol. For example:
```
sudo ufw allow 90:100/tcp
```
Will allow all services on ports 90 to 100 using the TCP protocol. You can reload and verify the status:
![UFW Port Ranges][8]
#### Allow and deny by services
To make things easier, you can also add rules using the service name:
```
sudo ufw allow <service name>
sudo ufw deny <service name>
```
For example, to allow incoming ssh and block and incoming HTTP services:
```
sudo ufw allow ssh
sudo ufw deny http
```
While doing so, **UFW** will read the services from **/etc/services**. You can check out the list yourself:
```
less /etc/services
```
![List /etc/services][9]
#### Add rules for applications
Some apps provide specific named services for ease of use and might even utilize different ports. One such example is **ssh**. You can see a list of such apps that are present on your machine with the following:
```
sudo ufw app list
```
![UFW App List][10]
In my case, the available applications are **CUPS** (a network printing system) and **OpenSSH**.
To add a rule for an application, type:
```
sudo ufw allow <application>
sudo ufw deny <application>
```
For example:
```
sudo ufw allow OpenSSH
```
Reloading and checking the status, you should see that the rule has been added:
![UFW Apps][11]
### Conclusion
This was just the tip of the iceberg firewall. There is so much more to firewalls in Linux that a book can be written on it. In fact, there is already an excellent book Linux Firewalls by Steve Suehring.
[Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond (4th Edition)][12]
$49.99
[Buy on Amazon][12]
We earn a commission if you make a purchase, at no additional cost to you.
11/26/2022 03:17 am GMT
If you think setting up a firewall with UFW, you should try using iptables or nftables. Then youll realize how UFW uncomplicates the firewall configuration.
I hope you liked this beginners guide to UFW. Let me know if you have questions or suggestions.
--------------------------------------------------------------------------------
via: https://itsfoss.com/ufw-ubuntu/
作者:[Abhishek Prakash][a]
选题:[lkxed][b]
译者:[译者ID](https://github.com/译者ID)
校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
[a]: https://itsfoss.com/
[b]: https://github.com/lkxed
[1]: https://itsfoss.com/ubuntu-server-vs-desktop/
[2]: http://gufw.org/
[3]: https://itsfoss.com/set-up-firewall-gufw/
[4]: https://help.ubuntu.com/community/UFW
[5]: https://itsfoss.com/wp-content/uploads/2022/11/check-ufw-status.png
[6]: https://learnubuntu.com/allow-port-firewall/
[7]: https://itsfoss.com/wp-content/uploads/2019/03/ufw_ports.png
[8]: https://itsfoss.com/wp-content/uploads/2019/03/ufw_port_ranges-1.png
[9]: https://itsfoss.com/wp-content/uploads/2019/03/etc_services.png
[10]: https://itsfoss.com/wp-content/uploads/2019/03/ufw_app_list.png
[11]: https://itsfoss.com/wp-content/uploads/2019/03/ufw_apps.png
[12]: https://www.amazon.com/dp/0134000021?tag=AAWP_PLACEHOLDER_TRACKING_ID