Updated May 8, 2026 A Firewall Group is a named bundle of inbound and outbound rules that you attach to a VM’s public IP. This page walks the dashboard create flow. Read Inbound vs outbound, layers, and rule format first if you haven’t — it explains protocol/port/IP formats, the system Default Firewall layer, and which ports you can never open.Documentation Index
Fetch the complete documentation index at: https://docs.rafftechnologies.com/llms.txt
Use this file to discover all available pages before exploring further.
Open the Firewall tab
In the left sidebar, click Networking → switch to the Firewall tab. The page shows the system Raff Default Firewall card at the top and Your Firewall Groups below.
The Create dialog

1. Name
Pick a label that’s easy to recognize when picking from a list —prod-web, db-private, bastion-only. The name must be unique inside your account. Names cannot be renamed today; pick deliberately.
2. Description (optional)
Free-form. Useful for explaining “why this group exists” — “Public web servers behind Cloudflare”, “Internal Postgres — never expose 5432 outside VPC”. Shows up in the Edit Rules dialog and helps teammates avoid misuse.3. Start from template (optional)
A dropdown of five pre-built rule sets. Picking one fills both rule lists below; you can edit any row before saving. Leave on Custom Rules to start blank.
| Template | Pre-fills |
|---|---|
| Web Server | Inbound: TCP 22 (SSH), TCP 80,443, ICMP. Outbound: ALL |
| Database Server | Inbound: TCP 22 (SSH), TCP 3306,5432 VPC-scoped. Outbound: ALL |
| SSH Only | Inbound: TCP 22. Outbound: ALL |
| Allow All | Inbound: ALL. Outbound: ALL — not recommended for production |
| Deny All | No inbound, no outbound — full lockdown |
network_id field automatically. Other templates leave source IP at 0.0.0.0/0 (any) — tighten as needed.
If you’d rather build from scratch, leave the dropdown at Choose a template or start custom… and use the empty rule rows below.
4. Inbound Rules — Allow incoming connections to your VM
Inbound rules define what the public internet can send to this VM. Each row has three controls:| Control | Values | Notes |
|---|---|---|
| Protocol dropdown | TCP (default), UDP, ICMP, ALL | Choose the protocol family |
| Ports field | 22, 80,443, 3000:4000, blank for ALL | Format options in Add rules |
| Source IP field | 0.0.0.0/0 (Any) (default), 192.168.1.100/32, etc. | CIDR notation |
| Goal | Protocol | Ports | Source IP |
|---|---|---|---|
| Web traffic from anywhere | TCP | 80,443 | 0.0.0.0/0 |
| SSH from your office only | TCP | 22 | (your office’s public IP)/32 |
| Game server | UDP | 27015 | 0.0.0.0/0 |
| Postgres from one app server | TCP | 5432 | (app server’s IP)/32 |
| Ping from anywhere | ICMP | (blank) | 0.0.0.0/0 |
5. Outbound Rules — Allow connections from your VM to the internet
Outbound rules define what the VM can connect out to. The default row in the dialog —ALL / All ports / 0.0.0.0/0 — means “this VM can reach anything on any port” and matches the system Default’s behavior. Most workloads keep this exact rule.
You’d add restrictive outbound rules when:
- You want to prevent a compromised VM from being used as an attack platform
- You’re running a VM that should only ever speak to specific destinations (a database that only talks to the application IP, a dev VM that should only reach package mirrors)
- You’re meeting a compliance requirement that mandates egress filtering
UDP 53 / TCP 53 to 0.0.0.0/0), NTP (UDP 123 to 0.0.0.0/0), and your package mirrors in the allowlist or the VM will become unmaintainable.
Up to 40 outbound rules per group.
6. Click Create Firewall Group
The dialog closes, the group appears in Your Firewall Groups withRules: <inbound count> in / <outbound count> out, VMs: None until you attach one, and Created: just now.
7. Attach to a VM
The group does nothing on its own — you have to attach it to a VM’s public IP for traffic to be filtered. Two paths:| From | How |
|---|---|
| Firewall Groups list | Group row’s ⋮ → Assign to VM → pick a VM |
| VM detail → Network tab | Click Attach next to Firewall: None on the IP card → pick this group |
Editing rules later
You can add, remove, or modify rules without detaching the group from VMs. The rule set on the platform side updates immediately. See Update rules for the in-place edit flow.Related
Inbound vs outbound
The model behind the dialog.
Add rules
Port and IP formats by example.
Attach to a VM
Apply the new group to a VM’s public IP.