How to install and configure a graphical firewall client in Ubuntu 10.10

This example shows how to specify a port range in your rules. Using the ports from the last two examples before this one, we specify a port range in the form: port1:port2. One advantage of using a port range is that it reduces the number of rules that you create.

gufw14
Specifying port ranges in a rule

There are four policies that can be defined in a rule: Allow, Deny, Reject and Limit. The effect of an Allow rule is self-explanatory. If a packet matches a Deny rule, the packet will be dropped silently. The source host is not notified. Reject will trigger an ICMP destination unreachable message back to the source host. Limit rules are used to place a cap on the number of unsuccessful attempts from a host. They protect against brute-force attacks. In ufw, the number of unsuccessful attempts that will trigger a rate-limiting rule is 6 (or more) within the last 30 seconds. When a rate-limiting rule is triggered, subsequent packets from the offending host are denied (DROPped). Rate limiting rules may be defined from all three tabs, not just from the Advanced tab.

gufw15
Actions

The following example shows a rate-limiting rule for incoming ssh traffic from a specific source to a specific destination.

gufw16
Anti brute-force attack rule

Related Posts

How to customize Linux Mint 12 KDE Linux Mint 12 KDE is the latest release of Linux Mint KDE, a distribution based on Ubuntu Desktop. It has already being reviewed on this website (see ...
Debian GNU/Linux 5 installation options The Debian GNU/Linux installer has always been one of the best installers you'll find on any free operating system. My one gripe with it is that it in...
How to enable auto-login and create a guest user account on Fedora 14 Fedora is one of very few distributions that does not have the auto-login feature in its graphical user management tool. Auto-login allows the system ...
How to disable fast startup in Windows 10 This is a very short article that shows how to disable the fast startup (fast boot) feature in Windows 10, a feature that makes Windows 10 boot much f...
Full disk encryption and LVM configuration in Ubuntu’s graphical installer Ubiquity, Ubuntu Desktop's graphical installation program, is very easy to use, very newbie friendly, but it lacks support for full disk encryption, L...
How to launch and use a shell terminal in Linux People new to Linux tend to react to any reference of the Linux shell terminal with fright. But there is nothing scary about our beloved shell termina...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


4 Comments

  1. Pingback: Links 21/10/2010: Tinycore 3.2, WebOS 2.0 | Techrights

  2. Pingback: Linux News » How to install and configure a graphical firewall client in Ubuntu 10.10

  3. Pingback: A graphical firewall client for Maverick « 0ddn1x: tricks with *nix

  4. Pingback: First time Ubuntu user, need help! - Overclock.net - Overclocking.net

Leave a Comment

Your email address will not be published. Required fields are marked *

*