

Great article, but I have a few suggestions to make it a bit safer. The following command will enable the OpenSSH UFW application profile and allow all connections to the default SSH port on the server: When working with remote servers, you’ll want to make sure that the SSH port is open to connections so that you are able to log in to your server remotely. Remember you can list all available application profiles with sudo ufw app list. If you’d want to only allow HTTPS requests from and to your web server, you’d have to first enable the most restrictive rule, which in this case would be Nginx HTTPS, and then disable the currently active Nginx Full rule: This output indicates that the Nginx Full application profile is currently enabled, allowing any and all connections to the web server both via HTTP as well as via HTTPS.
