If you already use tools like
ufw
oriptables
on your server, please read the Application Firewalling section before continuing.
Each server has a Firewall page which can be used to apply your Security Groups .
Similar to the way that firewall rules within Security Groups work, any groups you attach to your servers are applied in order from top to bottom.
DROP
rule at the bottom of one Security Group, will prevent rules in any subsequent groups from being reachedSecurity Groups run before any network traffic actually enters your server. This means that if your server is currently using application level rules such as ufw
or iptables
, you may need to disable or modify them to work with your groups:
ACCEPT
a port/IP using Security Groups in the Control Panel, but your application firewall is blocking them, the traffic will still be blocked from reaching your server.DROP
a port or IP using Security Groups in the Control Panel, the traffic will never reach your server. This means that any application rules which would usually allow that traffic through, will never be reached.If you have server management enabled, or your server is a semi-managed product such as Cloud Containers, you may notice that there are some "greyed-out" Security Groups that are always present in your server's firewall. These are called "retained access" groups, and we use them to ensure we can access your server to perform administrative tasks related to your management.
We intentionally try to limit these groups to very specific traffic, to ensure they don't collide with any rules you may add. Some examples of the rules within these groups include:
The image below shows an example configuration of a server firewall:
ACCEPT
rules for port 22
, for the source IPs that should have access.80
and 443
, so that web traffic can interact with the server.For completeness, the Security Groups in the above example could look like the following: