Do more with Cloud Firewalls
Easily secure your infrastructure and define what services are visible on your Droplets. Cloud Firewalls are free and perfect for staging and production deployments.
-
Scales as you grow
Cloud Firewalls is designed to grow with you. Once you define your filtering rules, you can easily apply them to new and existing Droplets.
-
Secure multiple Droplets
For groups of Droplets, simply tag them and the appropriate rules are immediately applied.
-
Control rules in one view
See all Cloud Firewall rules in one centralized view. Add, edit and remove rules in a single place and update your whole infrastructure.
-
Secure by default
You control which ports are open and which devices can access them. Whitelist by IP address range, tags, Droplets, or Load Balancers. Everything else is blocked by Cloud Firewalls.
Features
Firewalls place a barrier between your servers and other machines on the network to protect them from external attacks. Firewalls can be host-based, which are configured on a per-server basis using services like IPTables or UFW. Others, like Cloud Firewalls, are network-based and stop traffic at the network layer before it reaches the server.
You can apply cloud firewall rules to individual Droplets, but a more powerful option is to use tags. Tags are custom labels that you can apply to Droplets and other resources. When you add a tag to a firewall, any Droplets with that tag are automatically included in the firewall configuration.
Limits
- You can have a maximum of 10 Droplets per firewall and 5 tags per firewall. If you have more than 10 Droplets that need the same firewall, tag the Droplets, then add that tag to the firewall.
- Each firewall can have up to 50 total incoming and outgoing rules.
- You cannot apply cloud firewalls to load balancers.
- Firewalls affect both public and VPC network traffic. Rules specific to either must specify the public or private IP range.
- Firewalls support only ICMP, TCP, and UDP.
- Firewalls block traffic at the network layer before that traffic reaches your resources. Because of this, traffic logs are not available.