Define rules. Secure access.
The Firewall interface provides administrators with a way to explicitly control access to their deployment. You can create rules specifying protocols, port ranges, and source addresses. Once a rule is set, only traffic that matches is permitted, and everything else is blocked by default. This ensures precise control over who and what can access your system, improving security and compliance with organizational policies.
Rule-Based Access
Configure rules for specific protocols, port ranges, and source IPs.
Protocol Control
Select TCP, UDP, or other protocols to match traffic.
Port Filtering
Restrict traffic to defined port ranges for added security.
Source Management
Allow or block traffic from specific IP addresses or ranges.
Default Deny Policy
When firewall rules are active, only matching traffic is allowed; all else is blocked.
Whitelist Approach
Create a minimal rule set that explicitly allows only trusted sources.
Granular Security
Protect deployments from unexpected or malicious access attempts.
FAQs
Develop. Deploy. Stay Productive.
Xuda is the platform for frontend developers, providing the speed and reliability innovators need to create at the moment of inspiration.