SiteHost

Server Firewalls

Attaching Security Groups

If you already use tools like ufw or iptables on your server, please read the Application Firewalling section before continuing.

Each server has a Firewall page which can be used to apply your Security Groups .

  1. When logged into the Control Panel , click Servers in the left menu.
  2. Select the server you want to configure, from the table on screen
  3. Click the tab at the top of screen labelled Firewall. If the tab is not visible, firewalling is unfortunately not available for your server.
  4. Select the Security Group(s) you wish to apply to your server, and click Save Firewall

Group Ordering

Similar to the way that firewall rules within Security Groups work, any groups you attach to your servers are applied in order from top to bottom.

  • A given Security Group can only be used once per server
  • A general DROP rule at the bottom of one Security Group, will prevent rules in any subsequent groups from being reached

Application Firewalling

Security Groups run before any network traffic actually enters your server. This means that if your server is currently using application level rules such as ufw or iptables, you may need to disable or modify them to work with your groups:

  • If you ACCEPT a port/IP using Security Groups in the Control Panel, but your application firewall is blocking them, the traffic will still be blocked from reaching your server.
  • Similarly, if you DROP a port or IP using Security Groups in the Control Panel, the traffic will never reach your server. This means that any application rules which would usually allow that traffic through, will never be reached.

Retained Access Groups

If you have server management enabled, or your server is a semi-managed product such as Cloud Containers, you may notice that there are some "greyed-out" Security Groups that are always present in your server's firewall. These are called "retained access" groups, and we use them to ensure we can access your server to perform administrative tasks related to your management.

We intentionally try to limit these groups to very specific traffic, to ensure they don't collide with any rules you may add. Some examples of the rules within these groups include:

  • Retaining SSH access via certain IPs
  • Allowing your server to push metrics (such as CPU usage) to our systems

Example

The image below shows an example configuration of a server firewall:

  1. The SSH Access group only contains ACCEPT rules for port 22, for the source IPs that should have access.
  2. The HTTP/HTTPS Traffic group accepts all traffic related to ports 80 and 443, so that web traffic can interact with the server.
  3. The Drop ALL Traffic group drops any remaining traffic, that has not been processed by group 1 and 2. Keeping the server secure from any other traffic.

Security Group Details

For completeness, the Security Groups in the above example could look like the following: