Our firewall is a free security feature that filters your server's incoming and outgoing traffic.
This simple firewall offers basic protection and can, for example, prevent internal data from being unintentionally transferred to the public internet. However, you will need to implement your own firewall solution for advanced features.
The firewall is managed via policies. These are sets of rules that define the rules for incoming and outgoing traffic.
For newly ordered servers, the firewall is configured by default to allow all traffic initially, except for the sending of emails. You can then create your own policies and assign them to your server.
For existing servers, the firewall must first be configured. To do so, open the Server Control Panel (SCP), select a server, and open the Firewall menu item. Click Configure and confirm the process by clicking Yes.
The firewall is stateful. This means that it remembers connections originating from your server and automatically accepts return traffic. However, this only applies to TCP traffic. To whitelist UDP traffic, you must create INGRESS and EGRESS rules in your policy:
Example DNS Server: INGRESS, UDP, allow traffic TO port 53, EGRESS, UDP, allow traffic FROM port 53 (response traffic)
TCP (Transmission Control Protocol): Establishes a fixed connection that can be tracked by the firewall. This allows the firewall to automatically recognize responses to outgoing TCP connections.
UDP (User Datagram Protocol): There is no established session for the firewall to track. Therefore, both incoming and outgoing rules must be defined for UDP to allow requests and responses.
The firewall will be available from December 9, 2025, for all server products starting from Generation 12.
Older server generations will gradually be equipped with this feature. We are unable to provide an exact schedule at this time. We kindly ask for your patience.
You can set and assign your own firewall rules (policies) to a server. If no policies are assigned to a server, the firewall automatically allows all traffic. Policies are defined across servers in the Server Control Panel (SCP) and can then be assigned to a server.
The standard firewall contains non-editable rules that allow mandatory traffic. For example, DNS traffic to the netcup DNS servers is always allowed. Additionally, rules are set by default to prevent email spamming. However, you can view these rules and remove them if necessary.
If you want to block outgoing traffic (EGRESS), make sure to whitelist NTP traffic to your server's configured NTP server, for example. DHCP traffic must also be whitelisted. However, this is likely only necessary during the installation of your server. If you want to restore your default policies, click on Restore Default Policies under Firewall and confirm by clicking on Save. This action will not affect your existing policies.
Implicit rules cannot be removed or edited. By default, they are set to ACCEPT ANY. However, as soon as you create your own incoming rule, the implicit incoming rule automatically changes to DROP.
The same behavior applies to outgoing rules. Background: Without this automatic change, all connections would still be allowed despite the defined rules, making the firewall rules ineffective.
To enable emails via SMTP, the default firewall policy must be removed, as it blocks incoming and outgoing SMTP connections by default.
You can create up to 500 active rules per Server and public network interface within policies using the Server Control Panel. The following applies:
As soon as a rule for INGRESS or EGRESS is defined and saved, the default rule for INGRESS/EGRESS is changed to DROP accordingly.
Note that the REJECT action (discarding the traffic and sending a response to the sender) is not supported. Implement your own firewall solution for advanced features of this type.
Example: Port numbers: port “22” or port range “1000-11000”
To find out the ports for your services, check the documentation for your application or the configuration file for the service. The ports used are usually clearly specified there.
If a policy's rules are changed while it is being applied to a server, the new settings will take effect as soon as the change has been saved.
As this is a stateful firewall, firewall rules only apply when a connection is established. Already established connections are registered and processed according to their existing state. Subsequent packets are assigned to the existing connection and are not rechecked against the current rules. Therefore, such connections remain active even after a rule change that would otherwise prevent the connection from being established.
INGRESS, TCP, destination port 22, accept
EGRESS, TCP, source port 22, accept (Only define EGRESS if you have also configured extra EGRESS rules for client traffic, otherwise this traffic will be blocked (see example 5)).
INGRESS, TCP, destination ports 80,443, accept (2 rules)
EGRESS, TCP, source ports 80,443, accept (2 rules) (Only define EGRESS if you have also configured extra EGRESS rules for client traffic, otherwise this traffic will be blocked (see example 5)).
INGRESS, TCP, source IP-Prefixes =198.51.100.0/24, accept
EGRESS, TCP, destination IP-Prefixes =198.51.100.0/24, accept (Only define EGRESS if you have also configured extra EGRESS rules for client traffic, otherwise this traffic will be blocked (see example 5)).
INGRESS, TCP, source IPs = 198.51.100.10/32, 2001:db8::cafe/128, destination ports 3306 accept (2 rules)
EGRESS, TCP, destination IPs = 198.51.100.10/32, 2001:db8::cafe/128, source ports 3306 accept (2 rules) (Only define EGRESS if you have also configured extra EGRESS rules for client traffic, otherwise this traffic will be blocked (see example 5)).
For TCP, the firewall connection tracking will automatically allow return traffic (responses), so there is no need for INGRESS rules.
EGRESS, TCP, destination ports 80,443 accept (2 rules) (allows connecting to HTTP/S servers)
EGRESS, TCP, destination ports 22 accept (allows connecting to SSH servers)
EGRESS, UDP, destination ports 123 accept (allows syncing time with NTP servers)
INGRESS, UDP, source ports 123 accept (accepts NTP answer traffic)
Please note that once an EGRESS rule exists, the default action is DROP and anything that is not defined will be discarded. To ensure that everything continues to function as usual, EGRESS rules must be created for typical traffic, such as website visits (HTTP/S).
Example: EGRESS accept TO destination port 80,443
We recommend creating INGRESS rules only.
The firewall cannot be activated or deactivated directly. To temporarily allow all traffic, remove all policies from the server or create an “allow-all” policy. In this case, the allow policy must be placed above the other policies. Remember to remove this later.
Go to Options > Firewall Policies and click Add Firewall Policy. Add 2 rules for each protocol type: Incoming rule, ACCEPT and Outgoing rule, ACCEPT
Make sure that the allow-all policy is in first place. You can move the policy up using drag and drop.
Rules are applied immediately after saving.
The server remains active and does not need to be restarted.
You can also use your own firewall solutions at the operating system level of your VPS or root server. For example: ufw, iptables, firewalld Also, make sure you protect your access with two-factor authentication/SSH keys and keep your system up to date.
The firewall provides basic protection. It adds an upstream security layer to your network and blocks unwanted public services or system misconfigurations. However, it does not replace protection via local server firewalls. We recommend setting up your own internal firewall solutions, such as iptables or nftables, on the server itself. Also, make sure you protect your access with two-factor authentication/SSH keys and keep your system up to date.