Manage cookies that are used for advertising, such as ad personalization, remarketing, and ad effectiveness analysis.
5.21. Firewall for incoming traffic on VPS
Important points:
- When adding a rule, the correctness of the IP address, mask, and port is checked.
- Any changes will take effect within 5 minutes.
The firewall is configured in the "VPS" section on the "Firewall" tab:
Firewall rules are applied in iptables on the KVM server where the VPS is hosted for incoming traffic going to that VPS. This allows malicious traffic to be blocked before it reaches the server.
Each rule contains fields:
- Source IP — from where the traffic is coming (you can specify an IP address, a subnet in CIDR format, or leave it blank).
- An empty value means all IPv4 and IPv6 addresses.
- To apply the rule only to IPv6 addresses, specify
::/0.
- Source Port — the port from which the traffic is coming (you can specify a single port, multiple ports separated by commas or spaces, a range of ports separated by colons or hyphens, or leave it blank).
- Destination Port — the port to which the traffic is coming (you can specify the port number, range, or leave it blank).
- Protocol — any (*), TCP, UDP, or ICMP.
- Action — ACCEPT (allow) or DROP (deny).
When the Firewall is enabled, the rules from the list are first applied in the order in which they are displayed (the order can be changed by dragging and dropping), then the rule from the "Default rule" field is applied.
(1)