Before adding rules, it’s best to explicitly set the default behavior. By default, I like to block everything: both incoming and outgoing traffic. After that is done, I selectively open ports to support the services I wish to run. In contrast, UFW, by default, denies all incoming traffic but allows all outgoing traffic. That setup is accomplished manually with the following commands.
$ sudo ufw default deny incoming
$ sudo ufw default allow outgoing
The following commands open ports for named services that I use: namely, SSH (port 22), a web server (port 80), and Webmin (port 10000). Any services named in /etc/services may be identified by name instead of port number.
$ sudo ufw allow ssh
$ sudo ufw allow www
$ sudo ufw allow webmin
UFW also has a list of application presets, for common servers such as Apache, OpenSSH, Lighttpd, and Samba. You can view the list by issuing the command:
$ sudo ufw app list
You can implement firewall rules for Samba and Lighttpd by using the commands below, which specify the application name, not the service name. Note that you must enclose in quotation marks any application names that include spaces.
$ sudo ufw allow Samba
It’s better to limit Samba access to hosts on your LAN. Using ufw’s more complex syntax, you can do just that. Note that you have to add “app” before the application name in this case.
$ sudo ufw allow from 10.0.0.0/8 to 127.0.0.1 app Samba
$ sudo ufw allow to 10.0.0.0/8 from 127.0.0.1 app Samba
The following commands open the ports required by my Transmission-Daemon server. Here I must specify port numbers explicitly. Note that you use a colon instead of a dash to specify port ranges. Plus, when creating rules for port ranges, you must specify whether they apply to TCP or UDP.
$ sudo ufw allow 9091
$ sudo ufw allow 20500:20599/tcp
$ sudo ufw allow 20500:20599/udp
The following command opens up ports needed for MySQL, but only to hosts within the local network.
$ sudo ufw allow from 10.0.0.0/8 to any port 3306/tcp
If you wish to open up MySQL to the world, you could use a simpler syntax.
$ sudo ufw allow mysql
Deleting rules is pretty simple. Just use the following syntax, and replace <…> with the entire rule that you wish to delete.
$ sudo ufw delete <...>
$ sudo ufw delete allow ssh
$ sudo ufw delete allow 10000
You can also delete all the rules with a single command.
$ sudo ufw reset
Enabling the Firewall
The following command enables the firewall rules immediately, and upon subsequent system restarts. This command will also refresh the rules. Run this command each time you update your firewall configuration.
$ sudo ufw enable
Disabling the Firewall
To disable the firewall, simply issue the following command.
$ sudo ufw disable
Checking the Configuration
You can check your configuration by issuing one of the following commands. The “verbose” version shows more information.
$ sudo ufw status
$ sudo ufw status verbose
Firewall Configuration Script
Here is a script that I wrote to set up my firewall. This script resets the firewall to deny everything but the services/applications I have installed on my server. Run it with sudo. You only have to run it once, not on every boot.
#!/bin/sh # obtain server's IP address SERVERIP=`hostname --all-ip-addresses | cut --fields 1 --delimiter " "` # disable firewall ufw disable # reset all firewall rules ufw reset # set default rules: deny all incoming traffic, allow all outgoing traffic ufw default deny incoming ufw default allow outgoing # open port for SSH ufw allow OpenSSH # open port for Webmin ufw allow webmin # open ports for Samba file sharing ufw allow from 10.0.0.0/8 to $SERVERIP app Samba ufw allow to 10.0.0.0/8 from $SERVERIP app Samba # open ports for Transmission-Daemon ufw allow 9091 ufw allow 20500:20599/tcp ufw allow 20500:20599/udp # open port for MySQL ufw allow proto tcp from 10.0.0.0/8 to any port 3306
# open ports for Lighttpd
ufw allow “Lighttpd Full”
# open port for network time protocol (ntpd)
ufw allow ntp
# enable firewall
# list all firewall rules
ufw status verbose