To get started, ensure you have at least one dedicated server. Follow the instructions below to begin the setup process:
Log in to the customer portal and navigate to Firewalls from the left-hand menu
Click Create
In the Location field, select the location that matches the one where your dedicated servers are provisioned
In the Host section, select the dedicated servers to which the firewall rules will be applied
Configure firewall rules
The Inbound rules and Outbound rules sections allow you to define traffic rules for your firewall instance. Here is how the elements in both sections work:
Select the protocol for the rule (e.g., TCP, UDP, ICMP)
Port range. Specify a port or range of ports for allowed traffic (e.g., 22
for SSH, 80
for HTTP, or 0-65535
for all ports)
Source/Destination. Define the IP addresses or networks. In Inbound rules, this specifies the source of traffic, while in Outbound rules, it specifies the destination. By default, All IPv4
allows traffic from or to any IPv4 address
Add a short description to identify the rule (e.g., TCP for SSH
or UDP for DNS
)
Add rule button. Use this button to create a rule based on predefined presets. For example:
Selecting IMAPS in Inbound rules adds a rule with protocol TCP and port 993
Selecting HTTPS in Outbound rules adds a rule with protocol TCP and port 443
Once created, rules appear in their respective lists and can be edited or deleted using the icons in each row
Enter a firewall instance name. This name will help you distinguish between multiple instances
Click Create
In the opened window, confirm your action by clicking the Proceed button
Your firewall instance will be created.
A firewall is an essential security tool for protecting against external threats and malicious activity. The level of security directly depends on proper configuration which should block unauthorized traffic while maintaining optimal network performance. We've collected below the key points and recommendations for using the firewall service from servers.com.
Default rules are applied automatically. When a new firewall instance is created, default rules are automatically applied to restrict all traffic to any destination and from any source
Firewall blocks all traffic if no rules are defined. If all rules, including default ones, are removed, the firewall will block all traffic by default
Unspecified ports are blocked. If rules are applied only to specific ports, traffic for other unspecified ports will be blocked. For example, if rules are applied for ports 80 (HTTP) and 443 (HTTPS), port 22 (SSH) will be blocked
Allow only necessary ports, such as 80 (HTTP) and 443 (HTTPS) for public services, and block all other ports
Restrict access to remote connection ports 22 (SSH) and 3389 (RDP) from specific trusted IP addresses
Leave outbound traffic rules as default if no filtering is required
Avoid rule duplication