📖 ~1 min read
Table of contents
Symptom & Impact
Service is running locally but unreachable remotely, causing application outage perceptions.
Environment & Reproduction
Ubuntu 20.04 with ufw enabled and default deny inbound policy.
Root Cause Analysis
Required port/protocol not explicitly allowed, interface-specific rules missing, or rule order confusion.
Quick Triage
Check ‘sudo ufw status numbered’, service bind address, and external path with nc/curl tests.
Step-by-Step Diagnosis
Map listening sockets to expected firewall rules and confirm no upstream ACL/cloud SG mismatch.

Solution – Primary Fix
Add precise allow rule such as ‘sudo ufw allow 443/tcp’ and reload policy as needed.
Still having issues? Our IT Solutions & Services team can diagnose and resolve this for you. Get in touch for a free consultation.

Solution – Alternative Approaches
Use app profiles, interface-scoped rules, or temporary logging with ‘ufw logging on’ for tracing.
Verification & Acceptance Criteria
Remote connection succeeds from authorized sources while unauthorized traffic remains blocked.
Rollback Plan
Delete new rule by number and restore previous ufw backup if policy broadening was excessive.
Prevention & Hardening
Maintain firewall as code, review rule drift, and enforce least privilege by source CIDR.
Related Errors & Cross-Refs
Connection timed out, refused from reverse proxy, and incorrect bind to localhost only.
Related tutorial: View the step-by-step tutorial for Ubuntu 20.04 LTS.
View all Ubuntu 20.04 LTS tutorials on the Tutorials Hub →
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
ufw man page, Ubuntu firewall documentation, and nftables/iptables relationship notes.
Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today — we respond within one business day.