Learn How To Configure A Firewall In Linux With Ufw And Firewalld step-by-step. Secure your server with this practical guide for beginners and sysadmins.

Securing a Linux system is a top priority for administrators and users alike. One of the most effective ways to protect your servers or workstations is by configuring a firewall. In this complete guide, we’ll explain How To Configure A Firewall In Linux With Ufw And Firewalld, two of the most popular and powerful firewall management tools available. Whether you are a beginner or a seasoned sysadmin, this article will walk you through everything you need to know.
Why Firewalls Are Essential in Linux
Firewalls act as the first line of defense by filtering incoming and outgoing network traffic. They help:
- Block unauthorized access.
- Allow only trusted connections.
- Prevent potential attacks like port scanning or brute-force attempts.
Linux distributions often include a firewall system based on iptables or nftables, but managing these directly can be complex. That’s where tools like UFW (Uncomplicated Firewall) and Firewalld simplify configuration without sacrificing security.
Overview of UFW and Firewalld
Before diving into How To Configure A Firewall In Linux With Ufw And Firewalld, it’s important to understand what each tool does.
What Is UFW?
UFW stands for Uncomplicated Firewall, a user-friendly command-line tool for managing iptables rules.
Key features of UFW:
- Simple syntax for beginners.
- Perfect for Ubuntu, Debian, and derivatives.
- Quick commands to allow or deny specific services or ports.
What Is Firewalld?
Firewalld is a dynamic firewall manager used mainly in Red Hat-based distributions (Fedora, CentOS, RHEL).
Key features of Firewalld:
- Uses zones to define trust levels.
- Supports runtime and permanent rules.
- Integrates with services like NetworkManager.
Installing UFW and Firewalld
The first step in learning How To Configure A Firewall In Linux With Ufw And Firewalld is installation.
Install UFW (Debian/Ubuntu)
sudo apt update
sudo apt install ufw -y
Install Firewalld (Fedora/RHEL/CentOS)
sudo dnf install firewalld -y # Fedora/RHEL 8+
sudo systemctl enable firewalld
sudo systemctl start firewalld
Configuring UFW Step by Step
Here’s a quick guide to configuring UFW securely:
1. Check UFW Status
sudo ufw status
If inactive, enable it:
sudo ufw enable
2. Allow SSH Connections
To avoid losing access when managing a remote server:
sudo ufw allow ssh
or specify the port:
sudo ufw allow 22/tcp
3. Allow Specific Services or Ports
Examples:
sudo ufw allow http # Allow HTTP
sudo ufw allow https # Allow HTTPS
sudo ufw allow 8080/tcp
4. Deny or Remove Rules
sudo ufw deny 23/tcp # Block Telnet
sudo ufw delete allow 8080/tcp
5. Enable Logging
For monitoring:
sudo ufw logging on
Configuring Firewalld Step by Step
For Red Hat-based systems, here’s How To Configure A Firewall In Linux With Ufw And Firewalld using Firewalld.
1. Check Firewalld Status
sudo firewall-cmd --state
2. List Zones
Zones define trust levels (e.g., public, home, internal):
sudo firewall-cmd --get-zones
3. Assign Interfaces to Zones
sudo firewall-cmd --zone=public --change-interface=eth0 --permanent
4. Allow Services and Ports
Allow SSH:
sudo firewall-cmd --zone=public --add-service=ssh --permanent
Allow HTTP/HTTPS:
sudo firewall-cmd --zone=public --add-service=http --permanent
sudo firewall-cmd --zone=public --add-service=https --permanent
Open custom port:
sudo firewall-cmd --zone=public --add-port=8080/tcp --permanent
5. Reload to Apply Changes
sudo firewall-cmd --reload
6. List Active Rules
sudo firewall-cmd --list-all
Best Practices for Firewall Management
When implementing How To Configure A Firewall In Linux With Ufw And Firewalld, keep these tips in mind:
- Whitelist SSH first to avoid accidental lockouts.
- Use minimal rules to reduce complexity and potential conflicts.
- Monitor logs regularly to detect suspicious activity.
- Test configurations before deploying to production.
Frequently Asked Questions (FAQ)
1. Can I use UFW and Firewalld at the same time?
It’s not recommended. Running both can cause conflicts. Choose one based on your distribution and needs.
2. Which is better: UFW or Firewalld?
Both are excellent. UFW is ideal for Ubuntu/Debian, while Firewalld is preferred for Fedora/CentOS/RHEL.
3. How do I reset firewall rules?
- For UFW:
sudo ufw reset
- For Firewalld:
sudo firewall-cmd --complete-reload
4. Does enabling a firewall slow down the system?
No, firewalls operate at the kernel level and have minimal performance impact.
5. Can I manage these tools with a GUI?
Yes. GUFW is a graphical interface for UFW, and Firewalld provides firewall-config for desktop environments.
Conclusion
Configuring a firewall is one of the most important steps to secure your Linux system. By following this guide on How To Configure A Firewall In Linux With Ufw And Firewalld, you can protect your servers and networks from unauthorized access while maintaining flexibility and control.
Start applying these steps today and keep your infrastructure safe from potential threats.
Ready to secure your system? Pick the tool that matches your distribution and implement these configurations now.
En veselin.es exploramos las curiosidades más increíbles del mundo. Imágenes creadas con IA y ConfyUI y asignadas aleatoriamente: How To Configure A Firewall In Linux With Ufw And Firewalld. También ciencia, historia, tecnología, cultura, fenómenos inexplicables y datos que te dejarán con la boca abierta. Si te apasiona aprender cosas nuevas cada día, ¡este blog es para ti!
🧠 Aviso: Las imágenes de esta web han sido generadas automáticamente con ayuda de inteligencia artificial. Las imágenes mostradas pueden no representar con exactitud la realidad y deben considerarse parte del proceso creativo.
Este sitio es un experimento con fines educativos y de aprendizaje. ¡Disfruta del arte, la tecnología y la creación digital!
Descargo de responsabilidad: Las imágenes presentadas en esta web han sido generadas exclusivamente mediante herramientas de inteligencia artificial. No corresponden a fotografías reales ni a representaciones de personas existentes. Los títulos o nombres de archivo son generados automáticamente y no implican ninguna relación con entidades, marcas o individuos reales. Si tienes dudas o consideras que alguna imagen vulnera derechos, puedes contactarnos para su revisión o retirada.






