Define rules. Secure access.

The Firewall interface provides administrators with a way to explicitly control access to their deployment. You can create rules specifying protocols, port ranges, and source addresses. Once a rule is set, only traffic that matches is permitted, and everything else is blocked by default. This ensures precise control over who and what can access your system, improving security and compliance with organizational policies.

Rule-Based Access

Configure rules for specific protocols, port ranges, and source IPs.

Protocol Control

Select TCP, UDP, or other protocols to match traffic.

Port Filtering

Restrict traffic to defined port ranges for added security.

Source Management

Allow or block traffic from specific IP addresses or ranges.

Default Deny Policy

When firewall rules are active, only matching traffic is allowed; all else is blocked.

Whitelist Approach

Create a minimal rule set that explicitly allows only trusted sources.

Granular Security

Protect deployments from unexpected or malicious access attempts.

FAQs

By default, all traffic is allowed until you create your first rule. Once a rule is added, the Firewall switches to a default-deny mode, blocking all traffic unless it matches a defined rule.

Go to the Firewall tab and click 'New Rule'. Specify the protocol, port range, and allowed source IPs, then save to activate the rule.

Yes. When creating a rule, you can restrict access to specific source IP addresses or ranges, ensuring only trusted clients can connect.

Any traffic that does not match an active Firewall rule will be denied automatically once at least one rule exists.

Yes. You can update or delete existing rules at any time from the Firewall tab to adjust your deployment’s access policies.

Yes. Once a Firewall rule is saved, the changes are applied in real time and take effect immediately on your deployment.

Yes. When creating a rule, you can define single ports or a range of ports to block or allow for specific protocols.

Yes. The Firewall supports creating rules for different protocols, including TCP and UDP, so you can secure any type of service traffic.

When new rules are applied, existing connections may be affected if they no longer meet the rule criteria. It’s best to plan Firewall updates carefully.

Yes. Deleting all rules will restore the Firewall to its default state, which allows all incoming traffic without restriction.

Develop. Deploy. Stay Productive.

Xuda is the platform for frontend developers, providing the speed and reliability innovators need to create at the moment of inspiration.

Schedule a demo