Secure Your Traffic, Rule by Rule.

The Firewall tab provides a powerful interface for controlling incoming network traffic to your datacenter. By default, the firewall allows all traffic. However, as soon as you add your first rule, it switches to a default-deny policy, meaning only traffic that matches your defined rules will be permitted. You can create rules by specifying the protocol, port range, and source IP addresses for granular security control.

Granular Traffic Control

Define a secure perimeter for your server with a simple, rule-based system.

Rule-Based Configuration

Define specific rules to manage incoming connections. Each rule can be configured by Protocol (e.g., TCP, UDP, ICMP), a specific Port Range, and the allowed source IP addresses or ranges.

Default-Deny Security Model

The firewall operates on a secure model: it allows all traffic until the first rule is added. Afterward, it blocks everything by default, only permitting traffic that explicitly matches a rule you've created.

FAQs

The Firewall tab lets you configure rules to control incoming traffic by protocol, port range, and source IPs, securing your datacenter from unwanted connections.

By default, the firewall allows all traffic. Once you add the first rule, it switches to a default-deny model, blocking all traffic unless explicitly permitted.

It means that after adding the first firewall rule, all incoming traffic is blocked unless it matches a rule you’ve configured.

Rules are created by specifying the protocol (TCP, UDP, ICMP), port range, and source IP addresses or ranges that are allowed.

Yes. Firewall rules allow you to specify individual IP addresses or ranges to tightly control which sources can access your datacenter.

You can define rules for common protocols like TCP, UDP, and ICMP, giving you flexibility over how traffic is handled.

It creates a secure perimeter around your server, ensuring that only authorized traffic reaches your datacenter.

If no rules are defined, the firewall returns to its default state, allowing all incoming traffic.

You can tailor access precisely by combining protocol selection, port ranges, and source IP filters for detailed control.

You should configure rules whenever you want to restrict access to your datacenter, protect sensitive services, or enforce strict security policies.

Develop. Deploy. Stay Productive.

Xuda is the platform for frontend developers, providing the speed and reliability innovators need to create at the moment of inspiration.

Schedule a demo