DigitalOcean Cloud Firewalls are a network-based, stateful firewall service for Droplets provided at no additional cost. Cloud firewalls block all traffic that isn’t expressly permitted by a rule.
Inbound firewall rules define the traffic allowed to the server on which ports and from which sources. If no inbound rules are configured, no incoming traffic is permitted.
Outbound firewall rules define the traffic allowed to leave the server on which ports and to which destinations. If no outbound rules are configured, no outbound traffic is permitted.
The firewall rule management commands require the firewall’s ID. To retrieve a list of firewalls and their IDs, use the doctl compute firewall list
command.
The firewall rule management calls require the firewall’s ID. To retrieve a list of firewalls and their IDs, use the /v2/firewalls
firewalls endpoint.
To manage a firewall’s rules, navigate from Networking to Firewalls. Click the firewall’s name to go to its Rules tab. From here, you can create new rules and edit or delete existing rules.
You can create new inbound and outbound rules by opening the New rule select list under Inbound Rules or Outbound Rules, respectively. You can use a preset protocol or create a custom rule.
X-Forwarded-For
, Content-Type
, or User-Agent
.There are several common protocols available which fills the Protocol and Port Range fields automatically. For example, selecting HTTP
auto-fills the Protocol with TCP
and the Port Range with HTTP’s default of port 80.
If one of these services is listening on a non-standard port, you can configure it by creating a custom rule.
To add a custom rule, choose Custom, which allows you to define the protocol, port range, and source or destination.
For a custom rule, specify the:
Protocol. You can choose either TCP or UDP. Because ICMP has no port abstraction, to allow ICMP traffic, you select it directly from the New rule dropdown.
Port Range. For the TCP and UDP protocols, you can specify:
-
with no spaces, such as 3000-4000
. To open multiple non-sequential ports, create a separate rule for each.Sources for inbound rules, which lets you restrict the source of incoming connections. You can restrict incoming connections to:
0.0.0.0/0
(IPv4) or ::/0
(IPv6) into the addresses
field of the sources
object to allow incoming traffic from a specific type of IP address.Destinations for outbound rules, which lets you restrict the destination of outgoing connections.
You can limit the sources/destinations to:
To edit or delete a rule, open the rule’s More menu:
Choose Edit Rule or Delete Rule. When you select Delete Rule, the rule is deleted immediately without an additional confirmation prompt.