manera alternativa de montar reglas de acceso con una sintáxis más sencilla, monta tablas y cadenas a su antojo
ufw [--dry-run] [options] [rule syntax]
grep 'DEFAULT_' /etc/default/ufw
sudo ufw default deny incoming sudo ufw default allow outgoing
sudo ufw status verbose sudo ufw status numbered
sudo ufw show added sudo ufw show raw sudo ufw show listening sudo ufw show builtins sudo ufw show before-rules sudo ufw show user-rules sudo ufw show after-rules sudo ufw show logging-rules
sudo ufw allow 22 sudo ufw deny 22 sudo ufw deny 22/tcp sudo ufw allow ssh # /etc/services
sudo ufw deny from 192.168.2.100/8 to 192.168.2.101 port 25
sudo ufw allow 6000:7000 proto tcp
sudo ufw allow out on eth0 to any port 25 proto tcp sudo ufw deny in on eth0 from any 25 proto tcp
sudo ufw status numbered sudo ufw delete NUM # según lista
sudo ufw insert 1 allow from 10.213.6.0/24 port ssh
/via: https://www.linux.com/learn/introduction-uncomplicated-firewall-ufw /via: https://www.cyberciti.biz/faq/howto-configure-setup-firewall-with-ufw-on-ubuntu-linux/ /via: https://www.digitalocean.com/community/tutorials/como-configurar-un-firewall-con-ufw-en-ubuntu-18-04-es
sudo sed -i s/IPV6=yes/IPV6=no/g /etc/default/ufw
# ufw allow from 192.168.1.0/24 to 192.168.1.50 port ssh
/var/log/syslog
:Nov 8 17:28:44 macnux kernel: [10687.134802] [UFW BLOCK] IN=eth0 OUT= MAC=01:00:5e:00:00:01:f8:8e:85:40:78:be:08:00 SRC=192.168.1.1 DST=224.0.0.1 LEN=32 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=2