Tutorials/Tips, Ubuntu

How to install and configure a graphical firewall client in Ubuntu 10.10

This example shows how to specify a port range in your rules. Using the ports from the last two examples before this one, we specify a port range in the form: port1:port2. One advantage of using a port range is that it reduces the number of rules that you create.

gufw14
Specifying port ranges in a rule

There are four policies that can be defined in a rule: Allow, Deny, Reject and Limit. The effect of an Allow rule is self-explanatory. If a packet matches a Deny rule, the packet will be dropped silently. The source host is not notified. Reject will trigger an ICMP destination unreachable message back to the source host. Limit rules are used to place a cap on the number of unsuccessful attempts from a host. They protect against brute-force attacks. In ufw, the number of unsuccessful attempts that will trigger a rate-limiting rule is 6 (or more) within the last 30 seconds. When a rate-limiting rule is triggered, subsequent packets from the offending host are denied (DROPped). Rate limiting rules may be defined from all three tabs, not just from the Advanced tab.

gufw15
Actions

The following example shows a rate-limiting rule for incoming ssh traffic from a specific source to a specific destination.

gufw16
Anti brute-force attack rule

Related Posts

Disk encryption in ROSA Marathon 2012 ROSA Marathon is a Linux distribution derived from Mandriva Desktop. It is developed by ROSA Labs, a Linux solutions provider based in Moscow, Russia....
How to dual-boot Windows 7 and Ubuntu 11.04 For those Windows users who have discovered what Linux has to offer, but for one reason or another are not ready to completely abandon Windows, dual-b...
Replace UFW with FirewallD on Ubuntu 14.10 UFW, the Uncomplicated FireWall, is the default firewall application on Ubuntu 14.10. It's a nice application with a simple command line syntax and an...
Zap GPT data structures from a disk, while preserving existing MBR partitions Using GPT partitions, or a GPT partitioning scheme, takes care of the shortcomings of the MBR partitioning scheme. However, if you are not careful, i...
How to dual-boot BackTrack 5 R2 and Windows 7 alongside each other BackTrack Linux is now known as Kali Linux. You may read all Kali Linux articles and tutorial at http://linuxbsdos.com/category/kali-linux. BackT...
Disable Secure Boot on HP 250 G5 laptop Last week I bought two HP 250 G5 laptops as a gift for a couple of family members, then proceeded to install Linux Mint 18 Cinnamon alongside Windows ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


4 Comments

  1. Pingback: Links 21/10/2010: Tinycore 3.2, WebOS 2.0 | Techrights

  2. Pingback: Linux News » How to install and configure a graphical firewall client in Ubuntu 10.10

  3. Pingback: A graphical firewall client for Maverick « 0ddn1x: tricks with *nix

  4. Pingback: First time Ubuntu user, need help! - Overclock.net - Overclocking.net

Leave a Comment

Your email address will not be published. Required fields are marked *

*