Linux Deepin Gufw Active Rules

Linux Deepin is a desktop distribution based on Ubuntu Desktop that was recently added and reviewed on this website. (See Linux Deepin 11.12.1 review.)

It uses a heavily modified GNOME 3 desktop, and though it is based on Ubuntu, a new installation of Linux Deepin 11.12.1 does not have any of the network security applications that you find on Ubuntu enabled: A default installation of Linux Deepin 11.12.1, the latest edition, will leave your computer wide open for the bad guys to mess with.

This tutorial shows how you can install IPTables, the Linux firewall application, ufw, a command line frontend to IPTables, and Gufw, a graphical interface for managing ufw, the Uncomplicated Firewall, on Linux Deepin 11.12.1. The idea is to enhance the network security profile of your Linux Deepin installation. Before continuing, you might want to read why your computer needs a firewall enabled.

Installing these application can be accomplished from the command line or from Deepin Software Center (DSC), a graphical application for installing software on Deepin. Either method is easy, but let me present the graphical method first. From the panel, click on the icon of DSC (by default, there are seven icons on the panel. DSC is the fourth from either end).

When DSC starts, click on the Repository tab, then type “gufw” in the search field. Gufw should be the only entry in the search result. Click Install to install it. Because Gufw depends on ufw, which in turn depends on IPTables, you only need to install Gufw. The other packages will be installed with it, as they are dependencies. If you are new to Linux Deepin, DSC will not inform you about the dependencies. It will just install them in the background.
Linux Deepin Install Gufw

Related Post:  How to install Ansible on your favorite Linux distribution

Installing from the command line is just as easy. first, launch a terminal. This screen shot shows where to find it.
Linux Deepin Shell Terminal

When it launches, simply type sudo apt-get install gufw. Gufw, along with the other packages, will be installed.
Linux Deepin Install Gufw Terminal

Whether you installed it from DSC or from the command line, you will find an entry for Gufw in Applications > Other > Firewall Configuration. Click on it. Once it starts, you will notice that it is disabled by default. To enable it, first unlock it by clicking the “key” icon on the bottom right of the window. You will be asked to authenticate.
Linux Deepin Gufw Disabled

After authenticating, click on the Status switch. It will change from Off to On. Now, the firewall is enabled, and your computer has a network security layer and an improved network security profile, one that is much better than the default. If you do not enable any service on your computer that you need to access remotely, then you do not need to add any rules. This is because the default policy allows all outgoing connections, while denying all incoming connections, except those with an entry in the State table, that is, those that are related to an outgoing connection. This is called Stateful Inspection. If you need to add any rule, just click on the “+” button at the bottom left of the window.
Linux Deepin Gufw Enabled

Related Post:  Disk encryption: This is why you should always use it

This is the rule addition window. The three tabs give you the option to create rules using pre-configured applications and services, simple (broad) rules, and more granular or specific rules. If you need to enable a service that you want to access from other computers within your network, create rules from the Advanced window. Why? It allows you to create rules with specific IP addresses and ports from which a connection will be accepted.
Linux Deepin Gufw Rule

For example, the next three images show how to create an advanced rule to allow ssh connections only from the local network. In this type of rule, the incoming port number (From), and the target (To) IP address are optional. The From address can be a specific address, like or a whole subnet, like So, to create the ssh rule, you can specify the fields as shown in this image.
Linux Deepin Gufw Add Rule

Or as shown in the one below. Both are the same. After all the fields have been specified, click Add, then click Close to close the window.
Linux Deepin Gufw Add Advanced Rule

You should see the rules listed in order on the main Gufw window. Note: The two rules shown here are the same. Just one is needed. To delete a rule, select it and click on the “-” button.
Linux Deepin Gufw Active Rules


Share on facebook
Share on twitter
Share on pinterest
Share on linkedin

Hola! Did you notice that no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

22 Responses

    1. Did I contradict myself like that!


      That article was published 2 years ago. At that time, Cinnamon was my favorite, because KDE was still undergoing massive changes. Right now, KDE rocks! It’s my DE of choice because it’s features are more mature than that of others.

  1. Thanks a bunch. This was EXACTLY what I was looking for. I am a KDE/i3wm user, but wanted something lighter for a legacy machine. I had narrowed it down to Cinnamon or MATE –two DEs that I am unfamiliar with. This helped me make my decision to go with Cinnamon.

    Well done. Thank you.

  2. Their both Gnome derrivatives whats the actual difference?

    I will never understand why Linux users obssess over desktop looks yet understand zilch about the operating system.

    1. He explained the actual differences in the article. Apparently, in spite of the fact that you obviously didn’t read the article, you felt a comment was warranted?

      No wonder you will “never understand.” That’s a user error: you.

      Truth is that the average Linux user knows more about their computers than the average Windows user. No one obsesses over anything — when Windows 8 users complain about Windows 10, is that obsessing?

      If you hate Linux so much that you can’t see or think clearly, why read Linux articles?

  3. From beginners point of view the differences are minimal. May be something underneath is better in one or another, but I can’t name it.

  4. @Steve McGiffert: from what I’m reading re: Cinnamon vs Mate (1.5 yrs after your post), Cinnamon has alot of the Compiz tech built-in.

  5. I feel like this is similar to the windows 7 vs Windows 10 debate, windows 7 was a fan favorite and people did not like the Eco-system of 8 but wanted a more “modern os” so they took the best things from 7 and added the new stuff from 8. And made windows 10.

  6. That’s my thinking. Why would I want to run Mate, a fork of old Gnome. I loved Gnome 2, but if I wanted to stick with Gnome 2 I’d run Gnome 2, not MATE. But I like newer technologies, newer libraries, just not newer radically different interfaces. And Mint is that answer. All the power of Gnome 3, without the radical new interface. Mate may be good for older computers, maybe not as powerful hardware and such, but if your system is halfway decent, Cinnamon is the way to go. It’s not even that much of a resource hog and it’s not too flashy, they value simplicity and ease of use over ‘showing off’. I like to be able to install my GUI and be working and using it within a very very short time. I don’t want to waste hours customizing every little detail, that happens naturally over time.

  7. Is there any compatibility issue with MATE and newest linux software?
    – Will latest version of wine work ok on MATE?
    – Will ‘Steam for Linux’ work ok with MATE?

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.


The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.