sudo ufw status
#output
Status: inactive
--OR--
Status: active
Logging: on (low)
Default: deny (incoming), allow (outgoing), deny (routed)
New profiles: skip
sudo ufw enable
#output
Firewall is active and enabled on system startup
sudo ufw disable
sudo ufw status
#output
Status: active
To Action From
-- ------ ----
Anywhere DENY 10.10.10.10
sudo ufw default deny outgoing
sudo ufw default deny incoming
sudo ufw app list | grep Nginx
#output
Nginx Full
Nginx HTTP
Nginx HTTPS
sudo ufw deny from 10.10.10.10
sudo ufw deny from 10.10.10.10/24
sudo ufw deny in on eth0 from 10.10.10.10
sudo ufw allow in on eth0 from 10.10.10.10
sudo ufw allow from 10.10.10.10
sudo ufw status numbered
#output
Status: active
To Action From
-- ------ ----
[ 1] Anywhere DENY IN 10.10.10.10
[ 2] Anywhere on eth0 ALLOW IN 10.10.10.11
#now delete the rule
sudo ufw delete 1
sudo ufw allow “OpenSSH”
#output
Rule added
Rule added (v6)
#get status
sudo ufw status
Status: active
To Action From
-- ------ ----
OpenSSH ALLOW Anywhere
Nginx Full ALLOW Anywhere
OpenSSH (v6) ALLOW Anywhere (v6)
Nginx Full (v6) ALLOW Anywhere (v6)
#remove the service you want to deny
sudo ufw allow "Nginx HTTPS"
--OR--
sudo ufw delete allow "Nginx Full"
https://www.digitalocean.com/community/tutorials/ufw-essentials-common-firewall-rules-and-commands