{"id":719,"date":"2024-12-17T09:00:22","date_gmt":"2024-12-17T06:00:22","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/"},"modified":"2024-12-17T09:00:22","modified_gmt":"2024-12-17T06:00:22","slug":"understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/","title":{"rendered":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today\u2019s digital world, security is paramount, especially for servers exposed to the internet. One of the most effective ways to protect your Linux server from unauthorized access and potential cyber-attacks is by using a firewall. For beginners, the Uncomplicated Firewall (UFW) offers a straightforward way to manage firewall rules. This article will walk you through understanding UFW, its installation, usage, and best practices, ensuring your Linux server remains secure.<\/p>\n<p><\/p>\n<h2>What is UFW?<\/h2>\n<p><\/p>\n<p>UFW stands for Uncomplicated Firewall, and it is a user-friendly interface for managing iptables, the Linux kernel&#8217;s built-in firewall management tool. UFW is designed for ease of use, allowing users to create and manage firewall rules with simple commands, making it an attractive option for those new to Linux or firewall management.<\/p>\n<p><\/p>\n<h2>Installing UFW<\/h2>\n<p><\/p>\n<p>UFW comes pre-installed on many Linux distributions, especially Ubuntu. However, if you need to install it, you can do so using the following commands based on your distribution:<\/p>\n<p><\/p>\n<p><strong>For Ubuntu\/Debian:<\/strong><\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo apt update<br \/>\nsudo apt install ufw<\/code><\/pre>\n<p><\/p>\n<p><strong>For CentOS\/RHEL:<\/strong><\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo yum install ufw<\/code><\/pre>\n<p><\/p>\n<p>After installation, you can check the status of UFW with the following command:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw status<\/code><\/pre>\n<p><\/p>\n<p>If UFW is inactive, you can enable it using:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw enable<\/code><\/pre>\n<p><\/p>\n<h2>Understanding Basic UFW Commands<\/h2>\n<p><\/p>\n<p>Once UFW is installed and activated, you can start managing your firewall rules. Here are some fundamental commands that you will frequently use:<\/p>\n<p><\/p>\n<h3>1. <strong>Allowing Traffic<\/strong><\/h3>\n<p><\/p>\n<p>To allow incoming traffic on a specific port, use:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw allow &lt;port&gt;<\/code><\/pre>\n<p><\/p>\n<p>For example, to allow SSH traffic (port 22):<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw allow 22<\/code><\/pre>\n<p><\/p>\n<p>You can also specify a protocol (TCP or UDP) when allowing traffic:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw allow 80\/tcp    # Allow HTTP traffic<br \/>\nsudo ufw allow 53\/udp    # Allow DNS requests<\/code><\/pre>\n<p><\/p>\n<h3>2. <strong>Denying Traffic<\/strong><\/h3>\n<p><\/p>\n<p>To block incoming traffic on a specific port, use:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw deny &lt;port&gt;<\/code><\/pre>\n<p><\/p>\n<p>For example, to deny traffic on port 21 (FTP):<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw deny 21<\/code><\/pre>\n<p><\/p>\n<h3>3. <strong>Allowing\/Denying Traffic from Specific IPs<\/strong><\/h3>\n<p><\/p>\n<p>To allow or deny traffic from a specific IP address, you can use:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw allow from &lt;ip_address&gt;<br \/>\nsudo ufw deny from &lt;ip_address&gt;<\/code><\/pre>\n<p><\/p>\n<p>For instance, to allow incoming traffic from the local IP 192.168.1.100:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw allow from 192.168.1.100<\/code><\/pre>\n<p><\/p>\n<h3>4. <strong>Checking UFW Status<\/strong><\/h3>\n<p><\/p>\n<p>To see a detailed status of UFW and list all the current rules in place, use:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw status verbose<\/code><\/pre>\n<p><\/p>\n<h3>5. <strong>Deleting Rules<\/strong><\/h3>\n<p><\/p>\n<p>You can remove rules by using:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw delete allow &lt;port&gt;<br \/>\nsudo ufw delete deny &lt;port&gt;<\/code><\/pre>\n<p><\/p>\n<p>For example, to remove the rule that allows port 80:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw delete allow 80<\/code><\/pre>\n<p><\/p>\n<h2>UFW Profiles<\/h2>\n<p><\/p>\n<p>UFW also supports application profiles, which simplify the process of allowing traffic for common applications. You can list the available application profiles with:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw app list<\/code><\/pre>\n<p><\/p>\n<p>To allow traffic for a specific application, such as OpenSSH, simply use:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw allow OpenSSH<\/code><\/pre>\n<p><\/p>\n<h2>Best Practices for UFW<\/h2>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Default Policy<\/strong>: Set default policies to deny incoming traffic and allow outgoing traffic. This can be done with:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw default deny incoming<br \/>\nsudo ufw default allow outgoing<\/code><\/pre>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Use Specific Ports<\/strong>: Only open the ports necessary for your applications. Less exposed ports reduce the attack surface.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Limit Access<\/strong>: Whenever possible, limit access to specific IP addresses, especially for services such as SSH.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Monitor Logs<\/strong>: Regularly check your UFW logs to review incoming traffic attempts and adjust rules accordingly. You can enable logging with:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw logging on<\/code><\/pre>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Regular Updates<\/strong>: Regularly update your firewall rules as your server applications or underlying security needs change.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>UFW is a powerful tool that, when configured correctly, can significantly improve the security of your Linux server. By understanding and utilizing UFW, you can safeguard your server against unauthorized access while maintaining ease of use in managing your firewall rules.<\/p>\n<p><\/p>\n<p>If you\u2019re just starting with server administration, begin with UFW to establish a solid foundation for your Linux security practices. With its simplicity and robust functionality, UFW is a perfect choice for beginners and seasoned administrators alike.<\/p>\n<p><\/p>\n<p>For more information, tutorials, and tips on Linux administration and security, stay tuned to WafaTech Blog! Happy securing!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital world, security is paramount, especially for servers exposed to the internet. One of the most effective ways to protect your Linux server from unauthorized access and potential cyber-attacks is by using a firewall. For beginners, the Uncomplicated Firewall (UFW) offers a straightforward way to manage firewall rules. This article will walk you [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":720,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[422,408,233,265,223,302,421,214],"class_list":["post-719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-beginners","tag-firewall","tag-guide","tag-linux","tag-rules","tag-servers","tag-ufw","tag-understanding","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers\" \/>\n<meta property=\"og:description\" content=\"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-17T06:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers\",\"datePublished\":\"2024-12-17T06:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/\"},\"wordCount\":568,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png\",\"keywords\":[\"Beginners\",\"Firewall\",\"Guide\",\"Linux\",\"Rules\",\"Servers\",\"UFW\",\"Understanding\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/\",\"name\":\"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png\",\"datePublished\":\"2024-12-17T06:00:22+00:00\",\"description\":\"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server UFW firewall rules\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers - WafaTech Blogs","description":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/","og_locale":"en_US","og_type":"article","og_title":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers","og_description":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2024-12-17T06:00:22+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers","datePublished":"2024-12-17T06:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/"},"wordCount":568,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png","keywords":["Beginners","Firewall","Guide","Linux","Rules","Servers","UFW","Understanding"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/","name":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png","datePublished":"2024-12-17T06:00:22+00:00","description":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png","width":1024,"height":1024,"caption":"linux server UFW firewall rules"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/understanding-ufw-a-beginners-guide-to-firewall-rules-on-linux-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding UFW: A Beginner\u2019s Guide to Firewall Rules on Linux Servers"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Understanding-UFW-A-Beginners-Guide-to-Firewall-Rules-on-Linux.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=719"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/720"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}