Firewall Configuration
⏱️ Estimated reading time: 5 minutes
What is a Firewall?
A Firewall is a critical security component that regulates inbound and outbound network traffic to and from your cloud instance. Acting as a protective barrier between your server and the internet, it helps prevent unauthorized access and potential attacks.
With configurable rules based on IP addresses, ports, and protocols, firewalls allow you to:
- Allow or restrict access to services
- Protect against external threats
- Secure sensitive applications and data
Proper firewall configuration is essential for maintaining a secure cloud environment.
Accessing the Firewall Settings
You can manage firewall rules for your instance using two methods within the Webberstop Cloud Portal:
Option 1: Via the Network Menu
-
Navigate to the Networks section in the portal sidebar.
-
Click on the Public IP Address tab.
-
Locate the assigned public IP for your instance and click on Firewall.
Option 2: Via VM Settings
-
Go to the Instances section from the sidebar.
-
Select the instance you want to modify.
-
Open the VM Settings tab.
-
From the side panel, click on Firewall to view and manage rules for the assigned public IP.
Overview of Firewall Rules
Once inside the Firewall Management Panel, you'll see a list of existing firewall rules applied to the selected public IP.
Each rule defines:
- Source CIDR (e.g.,
0.0.0.0/0
for all IPs) - Protocol (TCP, UDP, ICMP)
- Port Range (Start and End ports)
Adding a Firewall Rule
To add a new firewall rule:
-
Click the ➕ Add Firewall Rule button in the top-right corner.
-
Fill out the form with the following details:
- Source CIDR: The IP range allowed to access the instance (e.g.,
192.168.1.0/24
, or0.0.0.0/0
for all IPs). - Protocol: Choose from
TCP
,UDP
, orICMP
. - Start Port / End Port: Specify the allowed port range (e.g.,
22
to22
for SSH).
- Source CIDR: The IP range allowed to access the instance (e.g.,
-
Click Add Firewall Rule to save and apply the new rule.
The rule will be instantly reflected in the firewall rules list.
Best Practices
- Use specific CIDR ranges instead of open access (
0.0.0.0/0
) when possible. - Restrict access to only the necessary ports (e.g., 22 for SSH, 80/443 for web traffic).
- Regularly audit and remove unused rules.
Firewall rules apply only to Public IPs. For internal traffic within VPC or Isolated Networks, refer to your internal security group settings.