Secure Your Traffic, Rule by Rule.

The Firewall tab provides administrators with a straightforward interface to secure their datacenter’s network traffic. Initially, all incoming traffic is allowed. As soon as the first rule is added, the firewall enforces a default-deny policy, blocking all traffic unless it explicitly matches the defined rules. Rules can be created by specifying protocol, port range, and allowed source IPs, giving you precise control over how traffic reaches your deployment.

Firewall Capabilities

Rule-Based Configuration

Add rules specifying protocol (TCP, UDP, ICMP, etc.), port ranges, and source IPs to tightly control incoming connections.

Default-Deny Security

Once any rule is added, the firewall blocks all other traffic by default—ensuring only explicitly permitted connections are allowed.

Interactive Management

A simple interface lets you add, edit, and save rules quickly, without needing complex configuration files.

FAQs

The Firewall tab allows administrators to secure their datacenter by controlling incoming network traffic with customizable rules.

Defining firewall rules ensures only authorized traffic reaches your deployment, protecting against unauthorized access and potential security threats.

By default, all incoming traffic is allowed. Once the first firewall rule is created, the system switches to a default-deny mode, blocking all traffic except what is explicitly permitted.

To create a rule, specify the protocol, port range, and allowed source IP addresses. Once saved, only traffic that matches these criteria will be allowed.

The firewall allows you to define rules based on specific protocols such as TCP, UDP, and others, providing precise control over network behavior.

You can define a single port or a range of ports to be allowed for incoming traffic. This gives flexibility to permit only the services you need, such as HTTP (80) or HTTPS (443).

Yes, firewall rules can limit access by source IP, ensuring that only trusted addresses can reach your deployment.

If no rules are added, the firewall remains in its default state where all incoming traffic is allowed.

Once the first rule is added, the firewall enforces a default-deny policy. From then on, only traffic that matches your rules will be permitted.

Yes, administrators can edit or delete firewall rules at any time, giving flexibility to adjust security as requirements change.

Develop. Deploy. Stay Productive.

Xuda is the platform for frontend developers, providing the speed and reliability innovators need to create at the moment of inspiration.

Schedule a demo