gufw16

UbuntuLike all Linux distributions, Ubuntu 10.10, aka, Maverick Meerkat, the latest version of the popular Linux distribution, ships with a firewall installed. The firewall is actually embedded in the kernel. In Ubuntu, the firewall’s original command line interface has been replaced by ufw, a more user-friendly command line script. Ufw, the Uncomplicated FireWall, has a graphical interface that is also a lot simpler to use than other graphical firewall interfaces in Linux.

This article will present a step by step guide on how to install and configure Gufw, the graphical interface to ufw.

Before installing and configuring Gufw, take a few moments to check the status of ufw. To do that, launch a shell terminal and type sudo ufw status. The output should read Status: inactive. That is the default state of ufw on a new installation of Ubuntu (10.10).

Ok, time to install Gufw, which is one of the featured applications in the Ubuntu Software Center. If you still have the terminal open, you can just type sudo apt-get install gufw to install it, or start the Software Center from Applications > Software Center, and install it from there.

Related Post:  Ubuntu 12.10 review

Installing Gufw from the Software Center

gufwinstall
Installing Gufw

Once installed, there will be an entry for it in the menu at System > Administration > Firewall configuration. This is the default Gufw interface. It is disabled.

gufw
Gufw disabled

This is Gufw’s interface in enabled status.

gufw1
Gufw enabled

By default, ufw operates in an inactive stateful tracking mode: All outgoing connections are allowed, and all incoming connections that are not related to an entry in the state table, that is, that are not related to an outgoing connection, are disallowed. The default incoming policy is DROP. All default policies are set out in the /etc/default/ufw file. By default, IPv6 traffic is blocked. To enable IPv6 traffic, edit /etc/default/ufw and change IPV6=no to IPV6=yes. Let us take a look at other files that are involved in the configuration of ufw/Gufw.

Ufw’s main configuration file is /etc/ufw/ufw.conf. The state of this file before Gufw is enabled is shown below. Note the highlighted entry.

gufw3
ufw.conf, default

The state of ufw.conf after Gufw is enabled, If you type sudo ufw status in a shell terminal, the output should read Status: active.

gufw2
ufw.conf, modified

That is all there is to installing and enabling Gufw in Ubuntu 10.10. Most users will not need to do anything beyond this point, but if you want to create custom rules, you can start creating them from Gufw, or from the command line using the ufw utility.

Related Post:  Disk encryption with Calamares, the Linux installer

Gufw comes with a default set of rules. You may read those rules in the /etc/default/ufw file. There are also rules defined in some files under the /etc/ufw directory. Those rules are in the before.rules and after.rules files. Equivalent IPv6 rules are in the before6.rules and after6.rules files. The rules in the “before” files are evaluated before any custom rules you create, and the “after” rules are evaluated after your custom rules.

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.