Define and enforce traffic rules with precision.

The Firewall tab provides a dedicated interface for configuring and monitoring network rules. By default, all traffic is permitted until specific rules are applied. Administrators can define protocol, port ranges, and source access, ensuring that only authorized traffic reaches the deployment. Rules can be edited or removed at any time, giving teams full control over security posture and compliance requirements.

Firewall Management Tools

Protocol Control

Specify which network protocols (e.g., TCP, UDP) are allowed for incoming connections.

Port Range Filtering

Control traffic by defining single ports or ranges (e.g., 80, 443, or custom intervals).

Source Restrictions

Restrict incoming traffic by IP or range (e.g., IPv4, IPv6, or custom subnets).

Rule Management

Add, edit, or remove rules dynamically without downtime for flexible configuration.

Default-Deny Policy

Once rules are applied, only matching traffic is allowed; all others are blocked.

FAQs

By default, all traffic is allowed until specific firewall rules are defined. Once rules are created, only traffic that matches them will be permitted.

Yes. You can create rules that explicitly allow only the required protocols and port ranges, while all other traffic will be blocked automatically.

When creating a firewall rule, you can specify the source IP addresses or ranges. Only requests from those sources will be allowed.

Yes. You can edit existing rules at any time to adjust protocol, port, or source settings without removing the entire rule.

Once a rule is removed, traffic previously restricted or allowed by that rule will follow the default policy or other defined rules.

Yes. Firewall rules can be applied to either IPv4, IPv6, or both, depending on your deployment’s network configuration.

Yes. Multiple rules can apply to the same port with different conditions, such as restricting access by protocol or IP range.

Yes. Once a rule is saved, changes take effect immediately and impact all incoming traffic matching the criteria.

You can define strict rules based on protocol, port, and IP sources to align with organizational or regulatory security requirements.

Yes. Removing all custom rules restores the default policy where all traffic is allowed.

Develop. Deploy. Stay Productive.

Xuda is the platform for frontend developers, providing the speed and reliability innovators need to create at the moment of inspiration.

Schedule a demo