Network Firewall
Port and protocol control at the network layer with 20 rules per IP.
Network-Level
Firewall
The Firewall service allows you to define up to 20 rules for each of your IP addresses. You can open and close TCP, UDP, and ICMP traffic on a per-port basis and define exceptions for specific source IP addresses.
The rules you define are applied on the network infrastructure before they ever reach your server. This prevents blocked traffic from consuming your server resources.
20
Rules / IP
3
Protocol
7/24
Active Protection
Rule Model — 10 IP Example
12.34.56.1012.34.56.1112.34.56.12Supported Protocols
TCP
Port-based control
UDP
Port-based control
ICMP
Ping / traceroute
20 Rules per IP
You can define 20 separate rules for each IP address. If you have 10 IP addresses, you have a total of 200 active rules.
TCP / UDP / ICMP Control
Set any protocol as open or closed for any port. Each protocol is managed with an independent rule set
Network Layer Blocking
The rules you define block malicious traffic at the network infrastructure before it ever reaches your server
Online Control Panel
Manage your rules from anywhere via browser. Changes take effect instantly
Turkey Location
The service is provided only for IP addresses in Turkey
Professional Security with VPN
Create enterprise-level, multi-layer network security architecture by using it with our VPN service
Example Usage Scenarios
Real examples of what you can do with firewall rules.
Close SSH Port Externally
Prevent brute-force attacks by closing TCP port 22 to the world and opening it only for your own IP address.
DENY TCP 0.0.0.0/0 → :22 • ALLOW TCP 1.2.3.4/32 → :22Restrict Windows RDP Access
Close port 3389 to public access; allow remote desktop connections only from your office or VPN IP address.
DENY TCP 0.0.0.0/0 → :3389 • ALLOW TCP Ofis_IP/32 → :3389Close Unused Ports
Minimize your attack surface by proactively blocking ports that are not open or used on your server.
DENY TCP+UDP 0.0.0.0/0 → :3306 • DENY TCP 0.0.0.0/0 → :6379Enterprise Rule Set with VPN
Combine our Turkey VPN service with a firewall to create an enterprise infrastructure that routes all management traffic through a VPN tunnel.
ALLOW TCP VPN_Subnet → :22 • DENY TCP 0.0.0.0/0 → :22Is a Firewall Not Enough?
This service only provides port and protocol-based network layer access control. For DDoS mitigation or HTTP/application layer protection, check out our specialized services.
DDoS Protection Service
Domestic 10–40 Gbps and international volumetric DDoS attack mitigation. Network traffic is cleaned before reaching your server.
WAF & Layer 7 Protection
Blocks HTTP traffic, bot attacks, and application layer attacks. 100% domestic development, 360,000 req/sec capacity.