{ Sailing the seas in a same boat as [db0](https://lemmy.dbzer0.com/u/db0), [Ĉielkorpo](https://lemmy.dbzer0.com/u/cielkorpo), [tenchiken](https://lemmy.dbzer0.com/u/tenchiken@lemmy.dbzer0.com) }
{ Sailing the seas in a same boat as [db0](https://lemmy.dbzer0.com/u/db0), [Ĉielkorpo](https://lemmy.dbzer0.com/u/cielkorpo), [tenchiken](https://lemmy.dbzer0.com/u/tenchiken@lemmy.dbzer0.com) }
I don't use Transmission or UFW, I use Area2 (CLI) and IPTables. But from what i know of UFW its just a frontend for IPTables. So firewall rules should be similar. So here are few rules you can try, but I highly recommend you do your research on how to properly use UFW or IPTables with Transmission.
// This command resets all your existing rules. sudo ufw reset // Block all outgoing and incoming traffic by default. sudo ufw default deny outgoing sudo ufw default deny incoming // Allow outgoing connections via VPN interface only. // Allow forwarding traffic through the VPN interface tun0 // Change "tun0" to your VPN interface and 12345 port to your Transmission port. sudo ufw allow out on tun0 to any port 12345 proto tcp sudo ufw allow out on tun0 to any port 12345 proto udp // Allow VPN service traffic on your normal interface (exp. eth0 or wlan0) // Replace x.x.x.x to your VPN server port and 1194 port to your VPN port. sudo ufw allow out to x.x.x.x port 1194 proto udp // Optionally if you dont want to restrict your vpn per ip/port do something like this. // Change eth0 to your network interface and 1194 port to your VPN port. sudo ufw allow out on eth0 to any port 1194 proto udp // Enable your UFW firewall rules. sudo ufw enable