IPv6 Firewall: Penggunaan ufw
Tool konfigurasi firewall yang relatif sederhana di kenal dengan nama UFW (singkatan dari Uncomplicated Firewall).
Instalasi
Instalasi bisa menggunakan perintah
sudo su sudo apt install ufw
Cek UFW firewall
Cek bisa menggunakan perintah,
sudo ufw status verbose
Hasil kalau baru di install, kira-kira
Status: inactive
Default-nya UFW firewall biasanya disable.
Enable UFW Firewall
Kita dapat mengaktifkan / meng-enable UFW menggunakan perintah berikut, yang akan me-load firewall dan meng-enable-nya saat boot.
sudo ufw enable
Untuk men-disable UFW firewall, gunakan perintah berikut, yang akan meng-unload firewall dan men-disable-nya saat boot
sudo ufw disable
UFW Default Policy
Secara default, UFW firewall akan menolak semua connection yang masuk dan hanya akan mengijinkan semua traffic yang keluar (outbound) saja. Ini berarti, semua tidak ada yang bisa akses ke server, kecuali jika kita mengijinkan port tertentu untuk dibuka. Maksudnya, semua layanan / service / aplikasi di server dapat mengakses jaringan di luar.
Default UFW firewall policy di letakan di file /etc/default/ufw dan dapat di ubah menggunakan perintah berikut,
sudo ufw default deny incoming sudo ufw default allow outgoing
UFW Application Profile
Saat menginstal paket software menggunakan APT package manager, dia akan menambahkan application profile di directory /etc/ufw/applications.d yang mendefinisikan service dan mengatur setting UFW.
Kita dapat membuat daftar semua profil aplikasi yang tersedia di server kita menggunakan perintah berikut.
sudo ufw app list
Bergantung pada penginstalan paket perangkat lunak pada sistem kita, hasilnya akan terlihat seperti berikut:
Available applications:
APACHE APACHE Full APACHE SECURE CUPS OpenSSH Postfix Postfix SMTPS Postfix Submission
Jika kita ingin mendapatkan informasi lebih lanjut tentang profil tertentu dan aturan yang ditetapkan kita dapat menggunakan perintah berikut.
sudo ufw app info 'Apache'
Profile: Apache Title: Web Server Description: Apache V2 is the next generation f the omnipresent Apache web server. Ports: 80/tcp
Enable IPv6 pada UFW
Jika server kita menggunakan IPv6, pastikan UFW dikonfigurasi untuk mendukung IPv6 dan IPv4. Untuk memverifikasinya, buka file konfigurasi UFW menggunakan editor favorit Anda.
sudo vi /etc/default/ufw
Kemudian pastikan "IPV6" set "yes" di file konfigurasi seperti yang ditunjukkan.
IPV6=yes
Save dan quit. Kemudian restart firewall dengan perintah berikut:
sudo ufw disable sudo ufw enable
Ijinkan sambungan SSH di UFW
Jika kita sekarang sudah mengaktifkan firewall UFW, itu akan memblokir semua koneksi masuk dan jika kita terhubung ke server melalui SSH dari lokasi jarak jauh, kita tidak akan dapat lagi menghubungi-nya.
Mari kita aktifkan koneksi SSH ke server untuk mengatasi hal itu menggunakan perintah berikut:
sudo ufw allow ssh
Jika kita menggunakan port SSH khusus (misalnya port 2222), maka kita harus membuka port tersebut di firewall UFW menggunakan perintah berikut.
sudo ufw allow 2222/tcp
Untuk memblokir semua koneksi SSH ketik perintah berikut.
sudo ufw deny ssh/tcp sudo ufw deny 2222/tcp [Jika menggunakan port yang lain]
Enable Specific Ports on UFW
You can also open a specific port in the firewall to allow connections via it to a certain service. For example, if you want to setup a web server which listens on port 80 (HTTP) and 443 (HTTPS) by default.
Below are the few examples of how to allow incoming connections to Apache services. Open Port 80 HTTP on UFW
$ sudo ufw allow http [By service name] $ sudo ufw allow 80/tcp [By port number] $ sudo ufw allow 'Apache' [By application profile]
Open Port 443 HTTPS on UFW
$ sudo ufw allow https $ sudo ufw allow 443/tcp $ sudo ufw allow 'Apache Secure'
Allow Port Ranges on UFW
Assuming you have some applications that you want to run on a range of ports (5000-5003), you can add all these ports using following commands.
sudo ufw allow 5000:5003/tcp sudo ufw allow 5000:5003/udp
Allow Specific IP Addresses
If you want to allow connections on all ports from specific IP address 192.168.56.1, then you need to specify from before the IP address.
$ sudo ufw allow from 192.168.56.1
Allow Specific IP Addresses on Specific Port
To allow connection on a specific port (for example port 22) from your home machine with IP address of 192.168.56.1, then you need to add any port and the port number after the IP address as shown.
$ sudo ufw allow from 192.168.56.1 to any port 22
Allow Network Subnets to Specific Port
To allow connections for particular IP addresses ranging from 192.168.1.1 to 192.168.1.254 to port 22 (SSH), run the following command.
$ sudo ufw allow from 192.168.1.0/24 to any port 22
Allow Specific Network Interface
To allow connections to specific network interface eth2 for a particular port 22 (SSH), run the following command.
$ sudo ufw allow in on eth2 to any port 22
Deny Connections on UFW
By default, all incoming connections are blocked, unless you have specifically open the connection on UFW. For example, you have opened the ports 80 and 443 and your web server is under attack from the unknown network 11.12.13.0/24.
To block all connections from this particular 11.12.13.0/24 network range, you can use the following command.
$ sudo ufw deny from 11.12.13.0/24
If you only want to block connections on ports 80 and 443, you can use the following commands.
$ sudo ufw deny from 11.12.13.0/24 to any port 80 $ sudo ufw deny from 11.12.13.0/24 to any port 443
Delete UFW Rules
There are 2 ways to delete UFW rules, by rule number and by actual rule.
To delete a UFW rules by using rule number, first you need to list rules by numbers using the following command.
$ sudo ufw status numbered
Sample Output
Status: active To Action From -- ------ ---- [ 1] 22/tcp ALLOW IN Anywhere [ 2] 80/tcp ALLOW IN Anywhere
To delete rule number 1, use the following command.
$ sudo ufw delete 1
The second method is to delete a rule by using the actual rule, for example to delete a rule, specify the port number with protocol as shown.
$ sudo ufw delete allow 22/tcp
Dry Run UFW Rules
You can run any ufw commands without actually making any changes in the system firewall using the --dry-run flag, this simply shows the changes that where suppose to happen.
$ sudo ufw --dry-run enable
Reset UFW Firewall
For one reason or the other, if you wish to delete / reset all firewall rules, type the following commands, it will revert all of your changes and start fresh.
$ sudo ufw reset $ sudo ufw status
UFW Advanced Functionality
The UFW firewall can manage to do anything that iptables does. This can be done with different sets of rules files, which are nothing, but simple iptables-restore text files.
Tuning of UFW firewall or adding additional iptables commands are not permitted via ufw command, is a just matter of altering following text files
/etc/default/ufw: The main configuration file with pre-defined rules. /etc/ufw/before[6].rules: In this file rules are calculated before adding via ufw command. /etc/ufw/after[6].rules: In this file rules are calculated after adding via ufw command. /etc/ufw/sysctl.conf: This file is used to tune kernel network. /etc/ufw/ufw.conf: This file enable the ufw on boot.
That’s It! UFW is a excellent front-end to iptables with an user friendly interface to define complex rules with a single ufw command.
If you have any queries or thoughts to share about this ufw article, use the comment form below to reach us.