个人工具

“UbuntuHelp:Uncomplicated Firewall ufw”的版本间的差异

来自Ubuntu中文

跳转至: 导航, 搜索
(新页面: {{From|https://help.ubuntu.com/community/Uncomplicated_Firewall_ufw}} {{Languages|UbuntuHelp:Uncomplicated_Firewall_ufw}} #title Uncomplicated Firewall - UFW == Firewall == === Introducti...)
 
(重定向页面到 UbuntuHelp:UFW
 
(未显示同一用户的1个中间版本)
第1行: 第1行:
 +
#REDIRECT [[UbuntuHelp:UFW]]
 +
Redirecting to [[UbuntuHelp:UFW|UFW]]...
 
{{From|https://help.ubuntu.com/community/Uncomplicated_Firewall_ufw}}
 
{{From|https://help.ubuntu.com/community/Uncomplicated_Firewall_ufw}}
 
{{Languages|UbuntuHelp:Uncomplicated_Firewall_ufw}}
 
{{Languages|UbuntuHelp:Uncomplicated_Firewall_ufw}}
#title Uncomplicated Firewall - UFW
 
== Firewall ==
 
=== Introduction ===
 
The Linux kernel includes the Netfilter subsystem, which is used to manipulate or decide the fate of network traffic headed into or through your server. All modern Linux firewall solutions use this system for packet filtering.
 
The kernel's packet filtering system would be of little use to administrators without a userspace interface to manage it. This is the purpose of iptables. When a packet reaches your server, it will be handed off to the Netfilter subsystem for acceptance, manipulation, or rejection based on the rules supplied to it from userspace via iptables. Thus, iptables is all you need to manage your firewall if you're familiar with it, but many frontends are available to simplify the task.
 
Howto: Use, setup, and Take advantage of the New Ubuntu Uncomplicated Firewall UFW
 
=== ufw - Uncomplicated Firewall ===
 
The default firewall configuration tool for Ubuntu is ufw. Developed to ease iptables firewall configuration, ufw provides a user friendly way to create an IPv4 or IPv6 host-based firewall.
 
ufw by default is initially disabled.
 
=== Basic Syntax and Examples ===
 
==== Set Default Rule ====
 
Setting the default mode of ufw is recommended before turning it on
 
Set Default Deny:
 
<pre><nowiki>
 
sudo ufw default deny
 
</nowiki></pre>
 
Set Default Allow:
 
<pre><nowiki>
 
sudo ufw default allow
 
</nowiki></pre>
 
==== Enable ufw ====
 
To turn UFW on:
 
<pre><nowiki>
 
sudo ufw enable
 
</nowiki></pre>
 
{{https://help.ubuntu.com/community/IconsPage?action=AttachFile&do=get&target=IconNote.png%7D%7D Unless you have used set the default to deny when you initially enable ufw it is in ALLOW mode, and will allow everything incoming and outgoing until you make rulesets.
 
==== Allow ====
 
sudo ufw allow <port>/<optional: protocol>
 
'''example:''' To allow incoming tcp and udp packet on port 53
 
<pre><nowiki>
 
sudo ufw allow 53
 
</nowiki></pre>
 
'''example:''' To allow incoming tcp packets on port 53
 
<pre><nowiki>
 
sudo ufw allow 53/tcp
 
</nowiki></pre>
 
'''example:''' To allow incoming udp packes on port 53
 
<pre><nowiki>
 
sudo ufw allow 53/udp
 
</nowiki></pre>
 
==== Deny ====
 
sudo ufw deny <port>/<optional: protocol>
 
'''example:''' To deny tcp and udp packets on port 53
 
<pre><nowiki>
 
sudo ufw deny 53
 
</nowiki></pre>
 
'''example:''' To deny incoming tcp packets on port 53
 
<pre><nowiki>
 
sudo ufw deny 53/tcp
 
</nowiki></pre>
 
'''example:''' To deny incoming udp packets on port 53
 
<pre><nowiki>
 
sudo ufw deny 53/udp
 
</nowiki></pre>
 
==== Services ====
 
You can also allow or deny by service name since ufw reads from /etc/services
 
To see get a list of services:
 
<pre><nowiki>
 
cat /etc/services | less
 
</nowiki></pre>
 
===== Allow by Service Name =====
 
sudo ufw allow <service name>
 
'''example:''' to allow ssh by name
 
<pre><nowiki>
 
sudo ufw allow ssh
 
</nowiki></pre>
 
===== Deny by Service Name =====
 
sudo ufw deny <service name>
 
'''example:''' to deny ssh by name
 
<pre><nowiki>
 
sudo ufw deny ssh
 
</nowiki></pre>
 
=== Status ===
 
{{https://help.ubuntu.com/community/IconsPage?action=AttachFile&do=get&target=important.png%7D%7D Checking the status of ufw will tell you if ufw is enabled or disabled and also list the current ufw rules that are applied to your iptables.
 
To check the status of ufw:
 
<pre><nowiki>
 
sudo ufw status
 
 
Firewall loaded
 
 
To                        Action  From
 
--                        ------  ----
 
22:tcp                    DENY    192.168.0.1
 
22:udp                    DENY    192.168.0.1
 
22:tcp                    DENY    192.168.0.7
 
22:udp                    DENY    192.168.0.7
 
22:tcp                    ALLOW  192.168.0.0/24
 
22:udp                    ALLOW  192.168.0.0/24
 
</nowiki></pre>
 
if ufw was not enabled the output would be:
 
<pre><nowiki>
 
sudo ufw status
 
Firewall not loaded
 
</nowiki></pre>
 
=== Disable ufw ===
 
To disable ufw use:
 
<pre><nowiki>
 
sudo ufw disable
 
</nowiki></pre>
 
=== Logging ===
 
To enable logging use:
 
<pre><nowiki>
 
ufw logging on
 
</nowiki></pre>
 
To disable logging use:
 
<pre><nowiki>
 
ufw logging off
 
</nowiki></pre>
 
=== Delete Existing Rule ===
 
To delete a rule, simply prefix the original rule with delete. For example, if the original rule was:
 
<pre><nowiki>
 
ufw deny 80/tcp
 
</nowiki></pre>
 
Use this to delete it:
 
<pre><nowiki>
 
sudo ufw delete deny 80/tcp
 
</nowiki></pre>
 
=== Advanced Syntax ===
 
You can also use a fuller syntax, specifying the source and destination addresses and ports.
 
==== Allow Access ====
 
This section shows how to allow specific access.
 
===== Allow by Specific IP =====
 
sudo ufw allow <ip address>
 
'''example:'''To allow packets from 207.46.232.182:
 
<pre><nowiki>
 
sudo ufw allow from 207.46.232.182
 
</nowiki></pre>
 
===== Allow by Subnet =====
 
You may use a net mask :
 
<pre><nowiki>
 
sudo ufw allow 192.168.1.0/24
 
</nowiki></pre>
 
===== Allow by specific port and IP address =====
 
sudo ufw allow from <ip address> to <protocol> port <port number>
 
'''example:''' allow ip address 192.168.0.4 access to port 22 for all protocols
 
<pre><nowiki>
 
sudo ufw allow from 192.168.0.4 to any port 22
 
</nowiki></pre>
 
===== Enable PING =====
 
<u>Note</u>: Security by obscurity may be of very little actual benefit with modern cracker scripts. '''By default, UFW blocks ping requests'''. You may find you wish to enable ping to diagnose networking problems.
 
You need to edit '''/etc/ufw/before.rules''' and remove the commment on this line (remove the # in the front)
 
<pre><nowiki>
 
-A ufw-before-input -p icmp --icmp-type echo-request -j ACCEPT
 
</nowiki></pre>
 
==== Deny Access ====
 
===== Deny by specific IP =====
 
sudo ufw deny from <ip address>
 
'''example:'''To block packets from 207.46.232.182:
 
<pre><nowiki>
 
sudo ufw deny from 207.46.232.182
 
</nowiki></pre>
 
===== Deny by specific port and IP address =====
 
sudo ufw deny from <ip address> to <protocol> port <port number>
 
'''example:''' deny ip address 192.168.0.1 access to port 22 for all protocols
 
<pre><nowiki>
 
sudo ufw deny from 192.168.0.1 to any port 22
 
</nowiki></pre>
 
===== Advanced Blocking Rules =====
 
Blocking IP addresses is not so straight forward if you have an existing set of rules as IPTABLES matches in order.
 
So if you started with default deny and added in port 80 for a public server :
 
<code><nowiki>sudo ufw allow 80</nowiki></code>
 
But then find IP address 111.222.3.44 is hacking your server :
 
<code><nowiki>sudo ufw deny 111.222.3.44</nowiki></code>
 
'''will do nothing (you allowed access with your first rule).'''
 
You need to edit '''/etc/ufw/before.rules''' and add a section "Block IP" after "Drop INVALID packets" :
 
<pre><nowiki>
 
-A ufw-before-input -s 111.222.3.44 -j DROP #Assuming no loging is desired of course)
 
# drop INVALID packets
 
# uncomment to log INVALID packets
 
#-A ufw-before-input -m conntrack --ctstate INVALID -j LOG --log-prefix "[UFW B$
 
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP
 
 
# Block IP
 
# This it is efective :)
 
-A ufw-before-input -s 111.222.3.44 -j DROP
 
</nowiki></pre>
 
=== Advanced Example ===
 
'''scenario:'''
 
you want to block access to port 22 from 192.168.0.1 and 192.168.0.7 but allow all other 192.168.0.x IPs to have access to port 22
 
<pre><nowiki>
 
sudo ufw deny from 192.168.0.1 to any port 22
 
sudo ufw deny from 192.168.0.7 to any port 22
 
sudo ufw allow from 192.168.0.0/24 to any port 22
 
</nowiki></pre>
 
{{https://help.ubuntu.com/community/IconsPage?action=AttachFile&do=get&target=important.png%7D%7D This puts the specific rules first and the generic second. Once a rule is matched the others will not be evaluated (see manual below) so you must put the specific rules first. '''As rules change you may need to delete old rules to ensure that new rules are put in the proper order.'''
 
To check your rules orders you can check the status; for the scenario the output below is the desired output for the rules to work properly
 
<pre><nowiki>
 
sudo ufw status
 
Firewall loaded
 
 
To                        Action  From
 
--                        ------  ----
 
22:tcp                    DENY    192.168.0.1
 
22:udp                    DENY    192.168.0.1
 
22:tcp                    DENY    192.168.0.7
 
22:udp                    DENY    192.168.0.7
 
22:tcp                    ALLOW  192.168.0.0/24
 
22:udp                    ALLOW  192.168.0.0/24
 
</nowiki></pre>
 
'''scenario change'''
 
You want to block access to port 22 to 192.168.0.3 as well as 192.168.0.1 and 192.168.0.7.
 
<pre><nowiki>
 
sudo ufw delete allow from 192.168.0.0/24 to any port 22
 
sudo ufw status
 
Firewall loaded
 
 
To                        Action  From
 
--                        ------  ----
 
22:tcp                    DENY    192.168.0.1
 
22:udp                    DENY    192.168.0.1
 
22:tcp                    DENY    192.168.0.7
 
22:udp                    DENY    192.168.0.7
 
 
sudo ufw deny 192.168.0.3 to any port 22
 
sudo ufw allow 192.168.0.0/24 to any port 22
 
sudo ufw status
 
 
Firewall loaded
 
 
To                        Action  From
 
--                        ------  ----
 
22:tcp                    DENY    192.168.0.1
 
22:udp                    DENY    192.168.0.1
 
22:tcp                    DENY    192.168.0.7
 
22:udp                    DENY    192.168.0.7
 
22:tcp                    DENY    192.168.0.3
 
22:udp                    DENY    192.168.0.3
 
22:tcp                    ALLOW  192.168.0.0/24
 
22:udp                    ALLOW  192.168.0.0/24
 
</nowiki></pre>
 
{{https://help.ubuntu.com/community/IconsPage?action=AttachFile&do=get&target=important.png%7D%7D If you simply add the deny rule the allow would have been above it and been applied instead of the deny
 
== Server Guide ==
 
For instructions on using ufw first see the offical manual
 
{*} https://help.ubuntu.com/8.04/serverguide/C/firewall.html
 
== Manual ==
 
The most recent syntax and manual can be retrieved by getting the man page.
 
Open a terminal window and type:
 
<pre><nowiki>
 
man ufw
 
</nowiki></pre>
 
----
 
[[category:CategoryNetworking]]
 
  
 
[[category:UbuntuHelp]]
 
[[category:UbuntuHelp]]

2009年11月17日 (二) 21:01的最新版本

重定向至:

Redirecting to UFW...