TESTING ARGS (logging)
0: logging on
WARN: Checks disabled
Logging enabled


-A ufw6-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
-A ufw6-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
-A ufw-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
-A ufw-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
#-A ufw6-before-input -m state --state INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
#-A ufw-before-input -m conntrack --ctstate INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
-A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK NOT-TO-ME]: "
1: logging off
WARN: Checks disabled
Logging disabled


# ufw_comment # -A ufw6-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
# ufw_comment # -A ufw6-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
# ufw_comment # -A ufw-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
# ufw_comment # -A ufw-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
#-A ufw6-before-input -m state --state INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
#-A ufw-before-input -m conntrack --ctstate INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
# ufw_comment # -A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK NOT-TO-ME]: "
2: LOGGING ON
WARN: Checks disabled
Logging enabled


-A ufw6-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
-A ufw6-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
-A ufw-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
-A ufw-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
#-A ufw6-before-input -m state --state INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
#-A ufw-before-input -m conntrack --ctstate INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
-A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK NOT-TO-ME]: "
3: LOGGING OFF
WARN: Checks disabled
Logging disabled


# ufw_comment # -A ufw6-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
# ufw_comment # -A ufw6-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
# ufw_comment # -A ufw-after-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK INPUT]: "
# ufw_comment # -A ufw-after-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK FORWARD]: "
#-A ufw6-before-input -m state --state INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
#-A ufw-before-input -m conntrack --ctstate INVALID -j LOG --log-prefix "[UFW BLOCK INVALID]: "
# ufw_comment # -A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK NOT-TO-ME]: "
TESTING ARGS (default)
4: enable
WARN: Checks disabled
Firewall started and enabled on system startup


5: default allow
WARN: Checks disabled
Default policy changed to 'allow'
(be sure to update your rules accordingly)


Chain INPUT (policy ACCEPT)
Chain FORWARD (policy DROP)
Chain OUTPUT (policy ACCEPT)
DEFAULT_INPUT_POLICY="ACCEPT"
DEFAULT_OUTPUT_POLICY="ACCEPT"
DEFAULT_FORWARD_POLICY="DROP"
6: default deny
WARN: Checks disabled
Default policy changed to 'deny'
(be sure to update your rules accordingly)


Chain INPUT (policy DROP)
Chain FORWARD (policy DROP)
Chain OUTPUT (policy ACCEPT)
DEFAULT_INPUT_POLICY="DROP"
DEFAULT_OUTPUT_POLICY="ACCEPT"
DEFAULT_FORWARD_POLICY="DROP"
7: DEFAULT ALLOW
WARN: Checks disabled
Default policy changed to 'allow'
(be sure to update your rules accordingly)


Chain INPUT (policy ACCEPT)
Chain FORWARD (policy DROP)
Chain OUTPUT (policy ACCEPT)
DEFAULT_INPUT_POLICY="ACCEPT"
DEFAULT_OUTPUT_POLICY="ACCEPT"
DEFAULT_FORWARD_POLICY="DROP"
8: DEFAULT DENY
WARN: Checks disabled
Default policy changed to 'deny'
(be sure to update your rules accordingly)


Chain INPUT (policy DROP)
Chain FORWARD (policy DROP)
Chain OUTPUT (policy ACCEPT)
DEFAULT_INPUT_POLICY="DROP"
DEFAULT_OUTPUT_POLICY="ACCEPT"
DEFAULT_FORWARD_POLICY="DROP"
9: default deny
WARN: Checks disabled
Default policy changed to 'deny'
(be sure to update your rules accordingly)


10: disable
WARN: Checks disabled
Firewall stopped and disabled on system startup


TESTING ARGS (enable/disable)
11: enable
WARN: Checks disabled
Firewall started and enabled on system startup


ENABLED=yes
12: disable
WARN: Checks disabled
Firewall stopped and disabled on system startup


ENABLED=no
13: ENABLE
WARN: Checks disabled
Firewall started and enabled on system startup


ENABLED=yes
14: DISABLE
WARN: Checks disabled
Firewall stopped and disabled on system startup


ENABLED=no
TESTING ARGS (allow/deny port)
15: allow 25
WARN: Checks disabled
Rules updated


16: deny 25
WARN: Checks disabled
Rules updated


17: deny 1
WARN: Checks disabled
Rules updated


18: deny 65535
WARN: Checks disabled
Rules updated


### tuple ### deny any 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j DROP
-A ufw-user-input -p udp --dport 25 -j DROP
--
### tuple ### deny any 1 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 1 -j DROP
-A ufw-user-input -p udp --dport 1 -j DROP
--
### tuple ### deny any 65535 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 65535 -j DROP
-A ufw-user-input -p udp --dport 65535 -j DROP
19: delete allow 25
WARN: Checks disabled
Rules updated


20: delete deny 25
WARN: Checks disabled
Rules updated


21: delete allow smtp
WARN: Checks disabled
Rules updated


22: delete deny smtp
WARN: Checks disabled
Rules updated


23: delete deny 1
WARN: Checks disabled
Rules updated


24: delete deny 65535
WARN: Checks disabled
Rules updated


TESTING ARGS (allow/deny to/from)
Man page
25: allow 53
WARN: Checks disabled
Rules updated


### tuple ### allow any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j ACCEPT
-A ufw-user-input -p udp --dport 53 -j ACCEPT
26: allow 25/tcp
WARN: Checks disabled
Rules updated


### tuple ### allow any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j ACCEPT
-A ufw-user-input -p udp --dport 53 -j ACCEPT
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

27: deny to any port 80 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j ACCEPT
-A ufw-user-input -p udp --dport 53 -j ACCEPT
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### deny tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j DROP

28: deny from 10.0.0.0/8 to 192.168.0.1 port 25 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j ACCEPT
-A ufw-user-input -p udp --dport 53 -j ACCEPT
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### deny tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j DROP

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

29: deny 53
WARN: Checks disabled
Rules updated


### tuple ### deny any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j DROP
-A ufw-user-input -p udp --dport 53 -j DROP
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### deny tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j DROP

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

30: allow 80/tcp
WARN: Checks disabled
Rules updated


### tuple ### deny any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j DROP
-A ufw-user-input -p udp --dport 53 -j DROP
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j ACCEPT

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

31: allow from 10.0.0.0/8
WARN: Checks disabled
Rules updated


### tuple ### deny any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j DROP
-A ufw-user-input -p udp --dport 53 -j DROP
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j ACCEPT

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

### tuple ### allow any any 0.0.0.0/0 any 10.0.0.0/8
-A ufw-user-input -s 10.0.0.0/8 -j ACCEPT

32: allow from 172.16.0.0/12
WARN: Checks disabled
Rules updated


### tuple ### deny any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j DROP
-A ufw-user-input -p udp --dport 53 -j DROP
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j ACCEPT

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

### tuple ### allow any any 0.0.0.0/0 any 10.0.0.0/8
-A ufw-user-input -s 10.0.0.0/8 -j ACCEPT

### tuple ### allow any any 0.0.0.0/0 any 172.16.0.0/12
-A ufw-user-input -s 172.16.0.0/12 -j ACCEPT

33: allow from 192.168.0.0/16
WARN: Checks disabled
Rules updated


### tuple ### deny any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j DROP
-A ufw-user-input -p udp --dport 53 -j DROP
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j ACCEPT

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

### tuple ### allow any any 0.0.0.0/0 any 10.0.0.0/8
-A ufw-user-input -s 10.0.0.0/8 -j ACCEPT

### tuple ### allow any any 0.0.0.0/0 any 172.16.0.0/12
-A ufw-user-input -s 172.16.0.0/12 -j ACCEPT

### tuple ### allow any any 0.0.0.0/0 any 192.168.0.0/16
-A ufw-user-input -s 192.168.0.0/16 -j ACCEPT

34: deny from 1.2.3.4 to any port 514 proto udp
WARN: Checks disabled
Rules updated


### tuple ### deny any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j DROP
-A ufw-user-input -p udp --dport 53 -j DROP
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j ACCEPT

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

### tuple ### allow any any 0.0.0.0/0 any 10.0.0.0/8
-A ufw-user-input -s 10.0.0.0/8 -j ACCEPT

### tuple ### allow any any 0.0.0.0/0 any 172.16.0.0/12
-A ufw-user-input -s 172.16.0.0/12 -j ACCEPT

### tuple ### allow any any 0.0.0.0/0 any 192.168.0.0/16
-A ufw-user-input -s 192.168.0.0/16 -j ACCEPT

### tuple ### deny udp 514 0.0.0.0/0 any 1.2.3.4
-A ufw-user-input -p udp --dport 514 -s 1.2.3.4 -j DROP

35: allow from 1.2.3.5 port 5469 proto udp to 1.2.3.4 port 5469
WARN: Checks disabled
Rules updated


### tuple ### deny any 53 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 53 -j DROP
-A ufw-user-input -p udp --dport 53 -j DROP
--
### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 80 -j ACCEPT

### tuple ### deny tcp 25 192.168.0.1 any 10.0.0.0/8
-A ufw-user-input -p tcp -d 192.168.0.1 --dport 25 -s 10.0.0.0/8 -j DROP

### tuple ### allow any any 0.0.0.0/0 any 10.0.0.0/8
-A ufw-user-input -s 10.0.0.0/8 -j ACCEPT

### tuple ### allow any any 0.0.0.0/0 any 172.16.0.0/12
-A ufw-user-input -s 172.16.0.0/12 -j ACCEPT

### tuple ### allow any any 0.0.0.0/0 any 192.168.0.0/16
-A ufw-user-input -s 192.168.0.0/16 -j ACCEPT

### tuple ### deny udp 514 0.0.0.0/0 any 1.2.3.4
-A ufw-user-input -p udp --dport 514 -s 1.2.3.4 -j DROP

### tuple ### allow udp 5469 1.2.3.4 5469 1.2.3.5
-A ufw-user-input -p udp -d 1.2.3.4 --dport 5469 -s 1.2.3.5 --sport 5469 -j ACCEPT

36: delete allow 53
WARN: Checks disabled
Rules updated


37: delete allow 25/tcp
WARN: Checks disabled
Rules updated


38: delete deny to any port 80 proto tcp
WARN: Checks disabled
Rules updated


39: delete deny from 10.0.0.0/8 to 192.168.0.1 port 25 proto tcp
WARN: Checks disabled
Rules updated


40: delete deny 53
WARN: Checks disabled
Rules updated


41: delete allow 80/tcp
WARN: Checks disabled
Rules updated


42: delete allow from 10.0.0.0/8
WARN: Checks disabled
Rules updated


43: delete allow from 172.16.0.0/12
WARN: Checks disabled
Rules updated


44: delete allow from 192.168.0.0/16
WARN: Checks disabled
Rules updated


45: delete deny from 1.2.3.4 to any port 514 proto udp
WARN: Checks disabled
Rules updated


46: delete allow from 1.2.3.5 port 5469 proto udp to 1.2.3.4 port 5469
WARN: Checks disabled
Rules updated


SIMPLE
47: allow 25
WARN: Checks disabled
Rules updated


### tuple ### allow any 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT
-A ufw-user-input -p udp --dport 25 -j ACCEPT
48: delete allow 25
WARN: Checks disabled
Rules updated


49: allow 25/tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

50: delete allow 25/tcp
WARN: Checks disabled
Rules updated


51: allow 25/udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p udp --dport 25 -j ACCEPT

52: delete allow 25/udp
WARN: Checks disabled
Rules updated


53: allow 25
WARN: Checks disabled
Rules updated


### tuple ### allow any 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT
-A ufw-user-input -p udp --dport 25 -j ACCEPT
54: delete allow 25
WARN: Checks disabled
Rules updated


55: allow 25/tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

56: delete allow 25/tcp
WARN: Checks disabled
Rules updated


57: allow 25/udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p udp --dport 25 -j ACCEPT

58: delete allow 25/udp
WARN: Checks disabled
Rules updated


59: allow smtp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

60: delete allow smtp
WARN: Checks disabled
Rules updated


61: allow smtp/tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 -j ACCEPT

62: delete allow smtp/tcp
WARN: Checks disabled
Rules updated


63: allow tftp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 -j ACCEPT

64: delete allow tftp
WARN: Checks disabled
Rules updated


65: allow tftp/udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 -j ACCEPT

66: delete allow tftp/udp
WARN: Checks disabled
Rules updated


67: allow ssh
WARN: Checks disabled
Rules updated


### tuple ### allow any 22 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 -j ACCEPT
-A ufw-user-input -p udp --dport 22 -j ACCEPT
68: delete allow ssh
WARN: Checks disabled
Rules updated


69: allow ssh/tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 22 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 -j ACCEPT

70: delete allow ssh/tcp
WARN: Checks disabled
Rules updated


71: allow ssh/udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 22 0.0.0.0/0 any 0.0.0.0/0
-A ufw-user-input -p udp --dport 22 -j ACCEPT

72: delete allow ssh/udp
WARN: Checks disabled
Rules updated


TO/FROM
73: allow from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### allow any any 0.0.0.0/0 any 192.168.0.1
-A ufw-user-input -s 192.168.0.1 -j ACCEPT

74: delete allow from 192.168.0.1
WARN: Checks disabled
Rules updated


75: allow to 10.0.0.1
WARN: Checks disabled
Rules updated


### tuple ### allow any any 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -d 10.0.0.1 -j ACCEPT

76: delete allow to 10.0.0.1
WARN: Checks disabled
Rules updated


77: allow to 10.0.0.1 from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### allow any any 10.0.0.1 any 192.168.0.1
-A ufw-user-input -d 10.0.0.1 -s 192.168.0.1 -j ACCEPT

78: delete allow to 10.0.0.1 from 192.168.0.1
WARN: Checks disabled
Rules updated


79: allow from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### allow any any 0.0.0.0/0 80 192.168.0.1
-A ufw-user-input -p tcp -s 192.168.0.1 --sport 80 -j ACCEPT
-A ufw-user-input -p udp -s 192.168.0.1 --sport 80 -j ACCEPT
80: delete allow from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


81: allow to 10.0.0.1 port 25
WARN: Checks disabled
Rules updated


### tuple ### allow any 25 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -j ACCEPT
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -j ACCEPT
82: delete allow to 10.0.0.1 port 25
WARN: Checks disabled
Rules updated


83: allow to 10.0.0.1 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### allow any any 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j ACCEPT
-A ufw-user-input -p udp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j ACCEPT
84: delete allow to 10.0.0.1 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


85: allow to 10.0.0.1 port 25 from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### allow any 25 10.0.0.1 any 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j ACCEPT
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j ACCEPT
86: delete allow to 10.0.0.1 port 25 from 192.168.0.1
WARN: Checks disabled
Rules updated


87: allow to 10.0.0.1 port 25 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### allow any 25 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j ACCEPT
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j ACCEPT
88: delete allow to 10.0.0.1 port 25 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


89: allow from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp any 0.0.0.0/0 80 192.168.0.1
-A ufw-user-input -p udp -s 192.168.0.1 --sport 80 -j ACCEPT

90: delete allow from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


91: allow to 10.0.0.1 port 25 proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 25 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -j ACCEPT

92: delete allow to 10.0.0.1 port 25 proto udp
WARN: Checks disabled
Rules updated


93: allow to 10.0.0.1 from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp any 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p udp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j ACCEPT

94: delete allow to 10.0.0.1 from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


95: allow to 10.0.0.1 port 25 proto udp from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### allow udp 25 10.0.0.1 any 192.168.0.1
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j ACCEPT

96: delete allow to 10.0.0.1 port 25 proto udp from 192.168.0.1
WARN: Checks disabled
Rules updated


97: allow to 10.0.0.1 port 25 proto udp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### allow udp 25 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j ACCEPT

98: delete allow to 10.0.0.1 port 25 proto udp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


99: allow from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp any 0.0.0.0/0 80 192.168.0.1
-A ufw-user-input -p tcp -s 192.168.0.1 --sport 80 -j ACCEPT

100: delete allow from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


101: allow to 10.0.0.1 port 25 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -j ACCEPT

102: delete allow to 10.0.0.1 port 25 proto tcp
WARN: Checks disabled
Rules updated


103: allow to 10.0.0.1 from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp any 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j ACCEPT

104: delete allow to 10.0.0.1 from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


105: allow to 10.0.0.1 port 25 proto tcp from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 10.0.0.1 any 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j ACCEPT

106: delete allow to 10.0.0.1 port 25 proto tcp from 192.168.0.1
WARN: Checks disabled
Rules updated


107: allow to 10.0.0.1 port 25 proto tcp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j ACCEPT

108: delete allow to 10.0.0.1 port 25 proto tcp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


109: deny from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### deny any any 0.0.0.0/0 any 192.168.0.1
-A ufw-user-input -s 192.168.0.1 -j DROP

110: delete deny from 192.168.0.1
WARN: Checks disabled
Rules updated


111: deny to 10.0.0.1
WARN: Checks disabled
Rules updated


### tuple ### deny any any 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -d 10.0.0.1 -j DROP

112: delete deny to 10.0.0.1
WARN: Checks disabled
Rules updated


113: deny to 10.0.0.1 from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### deny any any 10.0.0.1 any 192.168.0.1
-A ufw-user-input -d 10.0.0.1 -s 192.168.0.1 -j DROP

114: delete deny to 10.0.0.1 from 192.168.0.1
WARN: Checks disabled
Rules updated


115: deny from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### deny any any 0.0.0.0/0 80 192.168.0.1
-A ufw-user-input -p tcp -s 192.168.0.1 --sport 80 -j DROP
-A ufw-user-input -p udp -s 192.168.0.1 --sport 80 -j DROP
116: delete deny from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


117: deny to 10.0.0.1 port 25
WARN: Checks disabled
Rules updated


### tuple ### deny any 25 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -j DROP
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -j DROP
118: delete deny to 10.0.0.1 port 25
WARN: Checks disabled
Rules updated


119: deny to 10.0.0.1 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### deny any any 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j DROP
-A ufw-user-input -p udp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j DROP
120: delete deny to 10.0.0.1 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


121: deny to 10.0.0.1 port 25 from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### deny any 25 10.0.0.1 any 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j DROP
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j DROP
122: delete deny to 10.0.0.1 port 25 from 192.168.0.1
WARN: Checks disabled
Rules updated


123: deny to 10.0.0.1 port 25 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### deny any 25 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j DROP
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j DROP
124: delete deny to 10.0.0.1 port 25 from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


125: deny from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


### tuple ### deny udp any 0.0.0.0/0 80 192.168.0.1
-A ufw-user-input -p udp -s 192.168.0.1 --sport 80 -j DROP

126: delete deny from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


127: deny to 10.0.0.1 port 25 proto udp
WARN: Checks disabled
Rules updated


### tuple ### deny udp 25 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -j DROP

128: delete deny to 10.0.0.1 port 25 proto udp
WARN: Checks disabled
Rules updated


129: deny to 10.0.0.1 from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


### tuple ### deny udp any 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p udp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j DROP

130: delete deny to 10.0.0.1 from 192.168.0.1 port 80 proto udp
WARN: Checks disabled
Rules updated


131: deny to 10.0.0.1 port 25 proto udp from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### deny udp 25 10.0.0.1 any 192.168.0.1
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j DROP

132: delete deny to 10.0.0.1 port 25 proto udp from 192.168.0.1
WARN: Checks disabled
Rules updated


133: deny to 10.0.0.1 port 25 proto udp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### deny udp 25 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p udp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j DROP

134: delete deny to 10.0.0.1 port 25 proto udp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


135: deny from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### deny tcp any 0.0.0.0/0 80 192.168.0.1
-A ufw-user-input -p tcp -s 192.168.0.1 --sport 80 -j DROP

136: delete deny from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


137: deny to 10.0.0.1 port 25 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### deny tcp 25 10.0.0.1 any 0.0.0.0/0
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -j DROP

138: delete deny to 10.0.0.1 port 25 proto tcp
WARN: Checks disabled
Rules updated


139: deny to 10.0.0.1 from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### deny tcp any 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 -s 192.168.0.1 --sport 80 -j DROP

140: delete deny to 10.0.0.1 from 192.168.0.1 port 80 proto tcp
WARN: Checks disabled
Rules updated


141: deny to 10.0.0.1 port 25 proto tcp from 192.168.0.1
WARN: Checks disabled
Rules updated


### tuple ### deny tcp 25 10.0.0.1 any 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 -j DROP

142: delete deny to 10.0.0.1 port 25 proto tcp from 192.168.0.1
WARN: Checks disabled
Rules updated


143: deny to 10.0.0.1 port 25 proto tcp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


### tuple ### deny tcp 25 10.0.0.1 80 192.168.0.1
-A ufw-user-input -p tcp -d 10.0.0.1 --dport 25 -s 192.168.0.1 --sport 80 -j DROP

144: delete deny to 10.0.0.1 port 25 proto tcp from 192.168.0.1 port 80
WARN: Checks disabled
Rules updated


TESTING ARGS (status)
145: --dry-run status
WARN: Checks disabled
> Checking iptables



146: allow to any port smtp from any port smtp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 25 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 --sport 25 -j ACCEPT

147: delete allow to any port smtp from any port smtp
WARN: Checks disabled
Rules updated


148: allow to any port smtp from any port ssh
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 22 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 --sport 22 -j ACCEPT

149: delete allow to any port smtp from any port ssh
WARN: Checks disabled
Rules updated


150: allow to any port ssh from any port smtp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 22 0.0.0.0/0 25 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 --sport 25 -j ACCEPT

151: delete allow to any port ssh from any port smtp
WARN: Checks disabled
Rules updated


152: allow to any port smtp from any port 23
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 23 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 --sport 23 -j ACCEPT

153: delete allow to any port smtp from any port 23
WARN: Checks disabled
Rules updated


154: allow to any port 23 from any port smtp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 23 0.0.0.0/0 25 0.0.0.0/0
-A ufw-user-input -p tcp --dport 23 --sport 25 -j ACCEPT

155: delete allow to any port 23 from any port smtp
WARN: Checks disabled
Rules updated


156: allow to any port tftp from any port tftp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 69 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 --sport 69 -j ACCEPT

157: delete allow to any port tftp from any port tftp
WARN: Checks disabled
Rules updated


158: allow to any port tftp from any port ssh
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 22 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 --sport 22 -j ACCEPT

159: delete allow to any port tftp from any port ssh
WARN: Checks disabled
Rules updated


160: allow to any port ssh from any port tftp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 22 0.0.0.0/0 69 0.0.0.0/0
-A ufw-user-input -p udp --dport 22 --sport 69 -j ACCEPT

161: delete allow to any port ssh from any port tftp
WARN: Checks disabled
Rules updated


162: allow to any port tftp from any port 23
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 23 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 --sport 23 -j ACCEPT

163: delete allow to any port tftp from any port 23
WARN: Checks disabled
Rules updated


164: allow to any port 23 from any port tftp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 23 0.0.0.0/0 69 0.0.0.0/0
-A ufw-user-input -p udp --dport 23 --sport 69 -j ACCEPT

165: delete allow to any port 23 from any port tftp
WARN: Checks disabled
Rules updated


166: allow to any port ssh from any port 23
WARN: Checks disabled
Rules updated


### tuple ### allow any 22 0.0.0.0/0 23 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 --sport 23 -j ACCEPT
-A ufw-user-input -p udp --dport 22 --sport 23 -j ACCEPT
167: delete allow to any port ssh from any port 23
WARN: Checks disabled
Rules updated


168: allow to any port 23 from any port ssh
WARN: Checks disabled
Rules updated


### tuple ### allow any 23 0.0.0.0/0 22 0.0.0.0/0
-A ufw-user-input -p tcp --dport 23 --sport 22 -j ACCEPT
-A ufw-user-input -p udp --dport 23 --sport 22 -j ACCEPT
169: delete allow to any port 23 from any port ssh
WARN: Checks disabled
Rules updated


170: allow to any port ssh from any port domain
WARN: Checks disabled
Rules updated


### tuple ### allow any 22 0.0.0.0/0 53 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 --sport 53 -j ACCEPT
-A ufw-user-input -p udp --dport 22 --sport 53 -j ACCEPT
171: delete allow to any port ssh from any port domain
WARN: Checks disabled
Rules updated


172: allow to any port smtp from any port smtp proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 25 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 --sport 25 -j ACCEPT

173: delete allow to any port smtp from any port smtp proto tcp
WARN: Checks disabled
Rules updated


174: allow to any port smtp from any port ssh proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 22 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 --sport 22 -j ACCEPT

175: delete allow to any port smtp from any port ssh proto tcp
WARN: Checks disabled
Rules updated


176: allow to any port ssh from any port smtp proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 22 0.0.0.0/0 25 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 --sport 25 -j ACCEPT

177: delete allow to any port ssh from any port smtp proto tcp
WARN: Checks disabled
Rules updated


178: allow to any port smtp from any port 23 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 25 0.0.0.0/0 23 0.0.0.0/0
-A ufw-user-input -p tcp --dport 25 --sport 23 -j ACCEPT

179: delete allow to any port smtp from any port 23 proto tcp
WARN: Checks disabled
Rules updated


180: allow to any port 23 from any port smtp proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 23 0.0.0.0/0 25 0.0.0.0/0
-A ufw-user-input -p tcp --dport 23 --sport 25 -j ACCEPT

181: delete allow to any port 23 from any port smtp proto tcp
WARN: Checks disabled
Rules updated


182: allow to any port tftp from any port tftp proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 69 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 --sport 69 -j ACCEPT

183: delete allow to any port tftp from any port tftp proto udp
WARN: Checks disabled
Rules updated


184: allow to any port tftp from any port ssh proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 22 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 --sport 22 -j ACCEPT

185: delete allow to any port tftp from any port ssh proto udp
WARN: Checks disabled
Rules updated


186: allow to any port ssh from any port tftp proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 22 0.0.0.0/0 69 0.0.0.0/0
-A ufw-user-input -p udp --dport 22 --sport 69 -j ACCEPT

187: delete allow to any port ssh from any port tftp proto udp
WARN: Checks disabled
Rules updated


188: allow to any port tftp from any port 23 proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 69 0.0.0.0/0 23 0.0.0.0/0
-A ufw-user-input -p udp --dport 69 --sport 23 -j ACCEPT

189: delete allow to any port tftp from any port 23 proto udp
WARN: Checks disabled
Rules updated


190: allow to any port 23 from any port tftp proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 23 0.0.0.0/0 69 0.0.0.0/0
-A ufw-user-input -p udp --dport 23 --sport 69 -j ACCEPT

191: delete allow to any port 23 from any port tftp proto udp
WARN: Checks disabled
Rules updated


192: allow to any port ssh from any port 23 proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 22 0.0.0.0/0 23 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 --sport 23 -j ACCEPT

193: delete allow to any port ssh from any port 23 proto tcp
WARN: Checks disabled
Rules updated


194: allow to any port 23 from any port ssh proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 23 0.0.0.0/0 22 0.0.0.0/0
-A ufw-user-input -p tcp --dport 23 --sport 22 -j ACCEPT

195: delete allow to any port 23 from any port ssh proto tcp
WARN: Checks disabled
Rules updated


196: allow to any port ssh from any port domain proto tcp
WARN: Checks disabled
Rules updated


### tuple ### allow tcp 22 0.0.0.0/0 53 0.0.0.0/0
-A ufw-user-input -p tcp --dport 22 --sport 53 -j ACCEPT

197: delete allow to any port ssh from any port domain proto tcp
WARN: Checks disabled
Rules updated


198: allow to any port ssh from any port 23 proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 22 0.0.0.0/0 23 0.0.0.0/0
-A ufw-user-input -p udp --dport 22 --sport 23 -j ACCEPT

199: delete allow to any port ssh from any port 23 proto udp
WARN: Checks disabled
Rules updated


200: allow to any port 23 from any port ssh proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 23 0.0.0.0/0 22 0.0.0.0/0
-A ufw-user-input -p udp --dport 23 --sport 22 -j ACCEPT

201: delete allow to any port 23 from any port ssh proto udp
WARN: Checks disabled
Rules updated


202: allow to any port ssh from any port domain proto udp
WARN: Checks disabled
Rules updated


### tuple ### allow udp 22 0.0.0.0/0 53 0.0.0.0/0
-A ufw-user-input -p udp --dport 22 --sport 53 -j ACCEPT

203: delete allow to any port ssh from any port domain proto udp
WARN: Checks disabled
Rules updated


