Welcome to YLOAN.COM
yloan.com » Linux » Configure Firewall In Ubuntu
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Configure Firewall In Ubuntu

Configure Firewall In Ubuntu

Configure Firewall In Ubuntu

Ubuntu or any linux distribution is well known for its security, but we have to enable and configure it accordingly. There are two ways to configure ufw (Ubuntu Firewall): The command line way and the graphical way. Today, we are going to learn how to configure the Ubuntu firewall: 1. The Graphical Way: This is the easiest way to configure ufw. First of all, install the firewall system from synaptic or from the command line by typing:

sudo apt-get install ufw gufw

After Installation, open it from System -> Administration -> gufw.

Add the rule "Allow From 192.168.0.0/16" by pressing the add button and check the enabled option. Be sure to DENY all incoming connections. That's it, your system is almost secure from the outer world.

2. The Terminal Way: Perform the following steps to configure ufw from the command line:

Open the terminal by pressing ALT+F2 and type gnome-terminal in the run application window.

Now, type sudo ufw default DENY in the terminal and press enter.

Issue the appropriate root password and press enter again, ufw will show you the confirmation.

Now add the rule by typing sudo ufw ALLOW FROM 192.168.0.0/16 and press enter followed by ufw's confirmation.

Ufw configured.

There are many other options for ufw which can be viewed by typing:

man ufw

So, you have seen that Ubuntu is a beautiful linux derivative with lots of features. Regarding the security matter, Ubuntu covers the hard-core security options, if configured properly. It comes both for Client and Server based platforms.
Linux Disk Recovery After Disk Structure Corruption Pink And Red Lycra Spandex Zentai Suit Red And White Lycra Single Eyed Spandex Super Hero Zentai Suit Xbox 360 Fix - How to Fix the Red Ring of Death Focusing on the Most Intelligent Style – R4i Gold with R4i Red Card Bundle Port Ghalib Determined To Improve Southern Red Sea Holidays Ping Red Wood Putter Review How Black Hat SEO Can Destroy Your Business White Hat Search Engine Optimization Techniques For Floridian Businesses Black Hat Seo Techniques To Avoid In Tampa Grey Hat Seo Methods In Florida Watch Lehigh Mountain Hawks vs Marist Red Foxes NCAA Scores Online Live Choose Dedicated Hosting, Windows Hosting or Linux Hosting for Your Business
print
www.yloan.com guest:  register | login | search IP(3.139.61.71) / Processed in 0.007842 second(s), 5 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 27 , 1707, 12,
Configure Firewall In Ubuntu