HEX
Server: Apache/2.4.52 (Ubuntu)
System: Linux mail.btech-izolacje.pl 5.15.0-140-generic #150-Ubuntu SMP Sat Apr 12 06:00:09 UTC 2025 x86_64
User: pewna6876 (1017)
PHP: 8.2.28
Disabled: NONE
Upload Files
File: //snap/ufw/current/docs/ufw-on-snappy
UFW ON SNAPPY(8)		   May 2023		      UFW ON SNAPPY(8)

NAME
       ufw snap - using ufw as a snap

DESCRIPTION
       This  program  is  for managing a Linux firewall and aims to provide an
       easy to use interface for the admin user. This  interface  is  targeted
       primarily towards administering a bastion firewall.

       ufw packaged as a snap is very similar to ufw packaged on a traditional
       Linux distribution.

COMMANDS
       ufw.doc
	      documentation for ufw

       ufw    command line interface to ufw

       ufw.init
	      lowlevel inititialization script

GETTING STARTED
       When ufw is installed it is disabled by default and allowed to use  the
       firewall-control  interface. In case the interface is disconnected, you
       must first connect the firewall-control interface with:

	 $ sudo snap connect ufw:firewall-control

       This will give ufw the necessary permissions to manipulate the firewall
       and ensure the proper modules are loaded into the kernel.

       Now  you  can use ufw like normal. For example, to enable the firewall,
       allow ssh access, enable logging, and check the status of the firewall,
       perform:

	 $ sudo ufw allow ssh/tcp
	 $ sudo ufw logging low
	 $ sudo ufw enable
	 $ sudo ufw status verbose
	 Status: active
	 Logging: on (low)
	 Default: deny (incoming), allow (outgoing), disabled (routed)
	 New profiles: skip

	 To			    Action	From
	 --			    ------	----
	 22/tcp 		    ALLOW IN	Anywhere
	 22/tcp (v6)		    ALLOW IN	Anywhere (v6)

       ufw integrates into the boot sequence by providing the ufw.src service.
       It simply calls ufw.init start during boot. Service logs  can  be  seen
       with:

	 $ sudo journalctl --unit snap.ufw.srv

UFW FRAMEWORK
       On  a  snap-based  system  apps	have  access to a read-only area and a
       writable area. After initial install on service start,  ufw  will  copy
       the  default  configuration  from  the  read-only  area in $SNAP to the
       writable area in $SNAP_DATA. If you need or want to modify the configu-
       ration  files as described in the ufw-framework documentation, look for
       these files in $SNAP_DATA.  Upgrades are handled similarly to an tradi-
       tional  Ubuntu  system,	if the configuration files in $SNAP_DATA match
       the previously shipped version, the files will be updated  to  the  new
       version,  otherwise the files that are different are logged to the ser-
       vice log (see above) so that the files may be merged manually.

AUTHOR
       ufw is Copyright 2008-2023, Canonical Ltd.

May 2023						      UFW ON SNAPPY(8)