{"id":3027,"date":"2018-11-10T20:09:01","date_gmt":"2018-11-10T20:09:01","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=3027"},"modified":"2018-11-12T02:17:55","modified_gmt":"2018-11-12T02:17:55","slug":"ubuntu-allow-port-through-firewall","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/11\/10\/ubuntu-allow-port-through-firewall\/","title":{"rendered":"Ubuntu Allow Port Through Firewall"},"content":{"rendered":"<p>The default firewall on Ubuntu operating system is called UFW. The full form of UFW is Uncomplicated Firewall. According to the\u00a0<a href=\"https:\/\/help.ubuntu.com\/lts\/serverguide\/firewall.html.en\">official website of Ubuntu<\/a>, \u201cufw is not intended to provide complete firewall functionality via its command interface, but instead provides an easy way to add or remove simple rules. It is currently mainly used for host-based firewalls.\u201d So, UFW has a user friendly way of managing IPv4 and IPv6 simple firewall rules. You can\u2019t replace iptables with UFW. But, you can setup basic firewalls with UFW very easily.<\/p>\n<p>In this article, I will show you how to open and block ports through the Ubuntu\u2019s default firewall, UFW. Let\u2019s get started.<\/p>\n<p><a href=\"https:\/\/linuxhint.com\/ubuntu_allow_port_firewall\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The default firewall on Ubuntu operating system is called UFW. The full form of UFW is Uncomplicated Firewall. According to the\u00a0official website of Ubuntu, \u201cufw is not intended to provide complete firewall functionality via its command interface, but instead provides an easy way to add or remove simple rules. It is currently mainly used for &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/11\/10\/ubuntu-allow-port-through-firewall\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Ubuntu Allow Port Through Firewall&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3027","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/3027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=3027"}],"version-history":[{"count":2,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/3027\/revisions"}],"predecessor-version":[{"id":3231,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/3027\/revisions\/3231"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=3027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=3027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=3027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}