How to install and configure a graphical firewall client in Ubuntu 10.10

To create a custom rule, click on the Add button on the main Gufw window. The rule creation window has three tabs – Preconfigured, Simple and Advanced. From the Preconfigured, you can create very broad rules for a preset number of applications and services. The preset services are: FTP, HTTP, IMAP, NFS, POP3, Samba, SMTP, ssh, VNC and Zeroconf, and the preset applications or programs are: Amule, Deluge, KTorrent, Nicotine, qBittorrent, and Transmission.

gufw4
Preconfigured rules

The Simple tab allows you to create rules with a port number defined. This makes it possible to create rules for services and applications not preset in the Preconfigured tab.

gufw5
Gufw's simple rules creation interface

The Advanced tab makes it possible to create more specific rules using source and destinations ports and addresses.

gufw6
Gufw's advanced rules creation interface

The example below creates a rule from the Preconfigured tab allowing ssh traffic into a host. While this makes it easy for anybody to create a firewall rule, it lacks specificity. In this example, ssh traffic from all sources would be allowed in. That’s not a good thing, unless that is what you want.

gufw7
Using pre-configured services

Once a rule has been created, it will be shown in the main window of Gufw. You may also view the rule from a shell terminal by typing sudo ufw status.

gufw8
Generated rules in the main Gufw window

This second example shows how to create a rule from the Simple tab. The example shown in the image below is for a rule allowing ssh traffic in to the host.

gufw9
Creating rules in the Simple tab

Rather than use a service or application name, you could just specify the port number associated with that application or service. To repeat the ssh rule in the example above using a port number, you would specify port 22, which is the default port for ssh.

gufw10
Simple rule creation with port number

This example shows how to create a rule from the Advanced tab. The rule shown in the image below allows ssh traffic from all hosts in a network to a particular host in another network. Note: The IP addresses used in these rules do not represent addresses used in a real case.

gufw11
Advanced rule creation

What if you want to create a rule to allow IPsec VPN traffic. First, you need to know the port numbers involved in an IPsec conversation. These would be port 50 for the Encapsulating Security Payload (esp), and port 51 for the Authentication Header (ah). Thus to create the rule for esp, you would use the port number as shown below.
gufw12

To create a rule for the Authentication Header, you would specify port 51.
gufw13

Related Posts

How to enhance the physical security posture of your Linux/BSD-powered PC Securing a computer goes beyond more than just using strong passwords. You should consider what happens if an unauthorized person gains physical acce...
How to dual-boot Fedora 14 and Windows 7 How to dual-boot Fedora 14 and Windows 7 is next in a series of articles on dual-booting Windows and Linux distributions. The first was how to dual bo...
GNOME Software preview on Fedora 20 alpha GNOME Software is one of the more exciting features that I'm looking forward to in the next release of Fedora. This is a brand new project, but the pa...
How to avoid spyware, viruses on Windows 7, Vista and XP If you are a Windows user, you ought to be familiar with all forms of malware that has ever been created by man (and woman). By malware, I mean spywar...
Use K3b and Audacity to convert an 8-CD audiobook to an Ogg file This tutorial presents a step-by-step guide on how I used K3b and Audacity to convert an eight (8) CD audiobook to a single Ogg file. As a bonus, the ...
Ubuntu 8.10 Tidbits The desktop version of Ubuntu 8.10, which was released just yesterday, comes with a few nice features. Aside from those few new features, there are a ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


4 Comments

  1. Pingback: Links 21/10/2010: Tinycore 3.2, WebOS 2.0 | Techrights

  2. Pingback: Linux News » How to install and configure a graphical firewall client in Ubuntu 10.10

  3. Pingback: A graphical firewall client for Maverick « 0ddn1x: tricks with *nix

  4. Pingback: First time Ubuntu user, need help! - Overclock.net - Overclocking.net

Leave a Comment

Your email address will not be published. Required fields are marked *

*