Skip to main content

Firewall Configuration

⏱️ Estimated reading time: 5 minutes

What is a Firewall?

A Firewall is a critical security component that regulates inbound and outbound network traffic to and from your cloud instance. Acting as a protective barrier between your server and the internet, it helps prevent unauthorized access and potential attacks.

With configurable rules based on IP addresses, ports, and protocols, firewalls allow you to:

  • Allow or restrict access to services
  • Protect against external threats
  • Secure sensitive applications and data

Proper firewall configuration is essential for maintaining a secure cloud environment.


Accessing the Firewall Settings

You can manage firewall rules for your instance using two methods within the Webberstop Cloud Portal:

Option 1: Via the Network Menu

  1. Navigate to the Networks section in the portal sidebar.

  2. Click on the Public IP Address tab.

  3. Locate the assigned public IP for your instance and click on Firewall.


Option 2: Via VM Settings

  1. Go to the Instances section from the sidebar.

  2. Select the instance you want to modify.

  3. Open the VM Settings tab.

  4. From the side panel, click on Firewall to view and manage rules for the assigned public IP.


Overview of Firewall Rules

Once inside the Firewall Management Panel, you'll see a list of existing firewall rules applied to the selected public IP.

Each rule defines:

  • Source CIDR (e.g., 0.0.0.0/0 for all IPs)
  • Protocol (TCP, UDP, ICMP)
  • Port Range (Start and End ports)

Adding a Firewall Rule

To add a new firewall rule:

  1. Click the ➕ Add Firewall Rule button in the top-right corner.

  2. Fill out the form with the following details:

    • Source CIDR: The IP range allowed to access the instance (e.g., 192.168.1.0/24, or 0.0.0.0/0 for all IPs).
    • Protocol: Choose from TCP, UDP, or ICMP.
    • Start Port / End Port: Specify the allowed port range (e.g., 22 to 22 for SSH).
  3. Click Add Firewall Rule to save and apply the new rule.

The rule will be instantly reflected in the firewall rules list.


Best Practices

  • Use specific CIDR ranges instead of open access (0.0.0.0/0) when possible.
  • Restrict access to only the necessary ports (e.g., 22 for SSH, 80/443 for web traffic).
  • Regularly audit and remove unused rules.

tip

Firewall rules apply only to Public IPs. For internal traffic within VPC or Isolated Networks, refer to your internal security group settings.