Graphical tools for firewall configuration
Simple
The Gufw program window is simple and therefore self-explanatory (Figure 9). The firewall is switched on and off by a slider, and, much like firewalld, the system works with profiles that contain different rulesets. This strategy proves to be particularly interesting for users who use Gufw on their laptops, because the device accesses different profiles depending on the type of Internet access.
In the program window, you also use various functions in a table: The Rules tab lists the active rules; the Report tab shows details of the data transfer. The Log tab lists the function log of the firewall in a table and shows the usage history.
Modification
Profiles already exist that can be adapted or supplemented. To do so, click Edit | Preferences to bring up a dialog in which to create new profiles and modify the corresponding protocol function that individually defines the scope of the history (Figure 10). You can create the rules for the respective profiles in the Rules tab in the primary program window.
A new rule is added by clicking the green plus symbol in the lower-left corner to open a new window. The application filter is immediately noticeable in the window; it predefines useful settings, especially for certain games that require special ports to be enabled for smooth operation. These ports are already stored on the firewall so that you can immediately adopt the appropriate rules.
However, I recommend that you create your own profiles for such applications. When many occur in a default profile, it is a guaranteed security risk, because the firewall keeps specific ports for incoming and outgoing data packets open at all times, even in regular operation.
Changing rules is easy, as well: Select the rule to be changed and left-click the button with the gear icon. In a new window, make all the necessary adjustments in a few selection and input fields. When finished, activate the new settings with Apply and close the window.
On Record
Gufw displays the firewall's history logs in the Log tab. You can save the logs for later documentation and testing purposes, even if only on the clipboard, by clicking on the Copy to Clipboard button located below the display area when the Log tab is active. Next, paste the log into an editor and save the file. Using the adjacent button, delete logs if necessary.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Gnome 47.1 Released with a Few Fixes
The latest release of the Gnome desktop is all about fixing a few nagging issues and not about bringing new features into the mix.
-
System76 Unveils an Ampere-Powered Thelio Desktop
If you're looking for a new desktop system for developing autonomous driving and software-defined vehicle solutions. System76 has you covered.
-
VirtualBox 7.1.4 Includes Initial Support for Linux kernel 6.12
The latest version of VirtualBox has arrived and it not only adds initial support for kernel 6.12 but another feature that will make using the virtual machine tool much easier.
-
New Slimbook EVO with Raw AMD Ryzen Power
If you're looking for serious power in a 14" ultrabook that is powered by Linux, Slimbook has just the thing for you.
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.