Define security rules to control and restrict incoming network traffic.

The API Firewall dashboard provides administrators with precise control over inbound traffic to deployed APIs. Using customizable rules, teams can specify allowed protocols, port ranges, and source IPs to ensure only authorized requests are processed. By default, all traffic is permitted until explicit rules are added—at which point only matching traffic is allowed, and all others are blocked. This dashboard is critical for enhancing deployment security, enforcing network policies, and mitigating attack risks. With a simple rule editor and clear visual feedback, it empowers administrators to manage connectivity safely and efficiently.

Traffic Control & Security Rules

Define, edit, and apply firewall rules to manage and secure incoming API traffic.

Custom Rule Creation

Add rules specifying protocol type, port range, and allowed sources for precise control.

Default-Allow Mode

All traffic is allowed until custom rules are defined, ensuring smooth initial configuration.

Rule-Based Filtering

Once rules exist, only requests matching the criteria are permitted; all others are blocked.

Protocol & Port Management

Support for TCP, UDP, and other protocols with flexible port range configuration.

Enhanced Security Layer

Protect deployments against unauthorized access, DDoS attempts, and network-level exploits.

FAQs

It allows administrators to define and manage network rules that control which incoming connections are permitted or blocked, ensuring API security and compliance.

Yes. All inbound traffic is initially allowed until one or more firewall rules are added. Once rules exist, only matching traffic is permitted.

Rules can specify allowed protocols, port ranges, and source IP addresses or hostnames to control which requests can access your API.

Yes. You can create rules that restrict access from particular IP addresses, ranges, or even entire geographic regions as needed.

Rules are evaluated in order of priority, and the first matching rule determines whether traffic is allowed or denied.

Yes. Rules can be edited or removed at any time using the intuitive rule editor, allowing for flexible and dynamic traffic management.

No. Firewall operations are handled at the infrastructure level, ensuring that traffic filtering does not affect API response time or throughput.

Yes. The dashboard provides visual feedback and activity logs, allowing you to track denied connections and adjust rules accordingly.

While SSL encryption is maintained end-to-end, administrators can still control access at the network level without decrypting traffic content.

It protects your API from unauthorized access, DDoS attempts, and malicious scanning, ensuring secure, reliable service operation.

Develop. Deploy. Stay Productive.

Xuda is the platform for frontend developers, providing the speed and reliability innovators need to create at the moment of inspiration.

Schedule a demo