Contact Info

Atlas Cloud LLC 600 Cleveland Street Suite 348 Clearwater, FL 33755 USA

support@dedirock.com

Client Area
Recommended Services
Supported Scripts
WordPress
Hubspot
Joomla
Drupal
Wix
Shopify
Magento
Typeo3

Let’s start with UFW, the beginner-friendly firewall solution. Below are the steps to install and configure UFW on a Linux server.

Step 1: Install UFW

Most Linux distributions, such as Ubuntu, come with UFW pre-installed. If UFW isn’t installed on your server, you can install it using the following command:

				
					console.log( 'Code is Poetry' );
				
			

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

				
					sudo apt install ufw
				
			

Step 2: Enable UFW

Before enabling UFW, check its status to ensure it’s not already active:

				
					sudo ufw status
				
			

To enable UFW, run the following command:

				
					sudo ufw enable
				
			

You’ll be prompted to confirm. Once enabled, UFW will start blocking all incoming connections except those explicitly allowed by your rules.

Step 3: Allow SSH Connections

Since you’ll need SSH access to manage your server remotely, allow SSH connections through UFW:

				
					sudo ufw allow ssh
				
			

Alternatively, if your SSH service is running on a non-default port (e.g., port 2222), specify that port:

				
					sudo ufw allow 2222/tcp
				
			

Step 4: Allow or Deny Other Services

You can allow or deny specific services by name or port number. For example, to allow HTTP (port 80) and HTTPS (port 443) traffic for a web server:

				
					sudo ufw allow http
sudo ufw allow https
				
			

To block a port, use the deny command. For instance, to block access to port 8080:

				
					sudo ufw deny 8080
				
			

Step 5: View UFW Rules

You can view your current UFW rules with the following command:

				
					sudo ufw status numbered
				
			

This will display all active firewall rules along with their associated port numbers and protocols.

Step 6: Disable UFW (If Needed)

To disable UFW and stop the firewall temporarily:

				
					sudo ufw disable
				
			

How to Set Up iptables on a Linux Server

If you need more control over your firewall configuration, iptables is a powerful option. Here’s how to set up and configure iptables.

Step 1: Check if iptables is Installed

iptables usually comes pre-installed on most Linux distributions. You can check if it’s installed by running:

				
					sudo iptables -L
				
			

If iptables is not installed, you can install it with:

				
					sudo apt install iptables
				
			

Step 2: Set Default Policies

Before creating specific rules, it’s important to set default policies for how traffic should be handled. In this example, we’ll set iptables to allow outgoing traffic and block incoming traffic by default:

				
					sudo iptables -P INPUT DROP
sudo iptables -P FORWARD DROP
sudo iptables -P OUTPUT ACCEPT
				
			
  • INPUT DROP: Blocks all incoming traffic unless explicitly allowed.
  • FORWARD DROP: Blocks forwarding of traffic (not needed unless routing traffic through the server).
  • OUTPUT ACCEPT: Allows all outgoing traffic.

Step 3: Allow SSH Connections

Since you’ll need SSH access, allow incoming traffic on port 22 (or your custom SSH port):

				
					sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT
				
			

This command allows all TCP traffic on port 22. Replace 22 with your custom SSH port if necessary.

Step 4: Allow HTTP and HTTPS Traffic

If you’re running a web server, allow HTTP (port 80) and HTTPS (port 443) traffic:

				
					sudo iptables -A INPUT -p tcp --dport 80 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 443 -j ACCEPT
				
			

Step 5: Save and Apply iptables Rules

After configuring your iptables rules, it’s essential to save them so that they persist after a reboot. On Ubuntu, use the following command:

				
					sudo apt install iptables-persistent
sudo netfilter-persistent save
				
			

This will ensure that your iptables rules are applied even after your server is restarted.

Step 6: View iptables Rules

To view your current iptables rules, use:

sudo iptables -L -v

Best Practices for Firewall Configuration

To maximize the security of your Linux server, follow these best practices when setting up and managing your firewall:

  1. Limit SSH Access: Restrict SSH access to specific IP addresses (such as your home or office IP) to reduce the risk of brute force attacks:

				
					sudo ufw allow from your_ip_address to any port 22
				
			

    2. Use Non-Standard Ports: Changing the default SSH port from 22 to something less commonly targeted can reduce the number of brute force attempts.

    3.Set up Logging: Enable logging in UFW or iptables to keep track of all blocked traffic. This helps you identify and analyze any suspicious activity.

For UFW:

				
					sudo ufw logging on
				
			

For iptables:

				
					sudo iptables -A INPUT -j LOG
				
			

    4. Review Rules Regularly: Periodically review and update your firewall rules to ensure they’re still relevant and effective.

    5. Use Fail2Ban: Install Fail2Ban to monitor your server for failed login attempts and automatically ban IP addresses that show signs of malicious activity.

Setting up a firewall is an essential part of securing your Linux server. Whether you opt for the beginner-friendly UFW or the more advanced iptables, firewalls allow you to control the flow of traffic in and out of your server, preventing unauthorized access and mitigating attacks.

By following this tutorial and implementing best practices, you can ensure that your server is well-protected from malicious traffic, safeguarding your website, applications, and data from security threats.

.

Share this Post
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x