Our Firewall Panel offers comprehensive rule configuration options to protect your services against various DDoS attacks. This documentation explains how to create and manage custom security rules.
Firewall rules are processed according to sequence numbers:
Closed Chain Requirement: Rules should form an uninterrupted sequence (e.g., 1,2,3,4,5)
First Rule: Every destination IP prefix starts with sequence number one (1)
Processing Flow: Open chains (e.g., 1,2,4,5) stop processing after the last matching rule
Rule Limit: Maximum of ten (10) rules due to system limitations
All rule changes take effect in less than 1 second, allowing quick response to DDoS attacks. You can monitor rule performance and matching statistics in real-time through the Firewall Panel.