Updated May 8, 2026 The most-seen issues with Raff Firewall and the fix that resolves each. The single most common mistake — by a wide margin — is forgetting to reboot the VM after a firewall change, so that one is on top. If your issue isn’t here, contact support@rafftechnologies.com.Documentation Index
Fetch the complete documentation index at: https://docs.rafftechnologies.com/llms.txt
Use this file to discover all available pages before exploring further.
The reboot rule
I edited / attached / detached a Firewall Group and the rules don't seem to apply
I edited / attached / detached a Firewall Group and the rules don't seem to apply
- VM detail page → Restart action button — the simplest path
- Inside the guest —
sudo reboot(Linux) orshutdown /r /t 0(Windows)
nmap -p <port> <ip>, curl https://<ip>:<port>, etc. You should see the new rule’s effect now.For fleets behind a load balancer, roll the reboots through the fleet so service stays available.I rebooted but the rules still don't apply
I rebooted but the rules still don't apply
- The Firewall Group isn’t actually attached to that VM. Open the VM’s detail page → Network tab → check the IP card’s
Firewall:field. If it saysNone, the group isn’t attached. Click Attach to fix. - You’re testing from inside the VPC. Internal traffic to the VM’s public IP can take a different code path; firewall rules only apply to public-internet traffic. Test from your laptop or a VM in another account/region.
- Guest-OS firewall is also blocking.
ufw status(Ubuntu/Debian),firewalld(RHEL/CentOS), or Windows Firewall might be blocking on top of the Raff firewall. Open the port in the guest too. - Wrong protocol. TCP rule won’t match UDP traffic and vice versa. Confirm your client is using the protocol the rule allows.
- System Default Firewall is blocking — see below.
System Default Firewall blocks
My rule for TCP 135 / 139 / 445 / 5985-5986 / UDP 137-138 disappeared on save
My rule for TCP 135 / 139 / 445 / 5985-5986 / UDP 137-138 disappeared on save
- Run the service inside a VPC instead of on a public IP, then deploy a Firewall Appliance (OPNsense) as the VPC’s gateway and configure inbound rules there. The system Default doesn’t apply to private interfaces, and OPNsense can allow whatever you want.
- Tunnel over a different port — run SMB inside a WireGuard tunnel on a different port, expose only the WireGuard endpoint
My port range rule (e.g., `130:200`) was saved with gaps in it
My port range rule (e.g., `130:200`) was saved with gaps in it
130:200 is saved as 130:134,136:138,140:200 — ports 135 and 139 carved out.Fix: that’s working as designed. The sanitization is honest about what’s actually allowed; if you tried to save 130:200, traffic to 135 and 139 was never going to reach the VM anyway. The saved form just makes the actual behavior visible.Saving and editing
Save fails with `invalid port format`
Save fails with `invalid port format`
| What you typed | What to type instead |
|---|---|
3000-4000 (AWS-style hyphen) | 3000:4000 (Raff uses colon for ranges) |
80, 443 (space after comma) | 80,443 (no spaces) |
0 or negative | A port between 1 and 65535 |
http / https (protocol names) | 80 / 443 (port numbers) |
A range with the second port lower than the first (e.g. 4000:3000) | Reorder — 3000:4000 |
Save fails with `invalid CIDR`
Save fails with `invalid CIDR`
| What you typed | What to type instead |
|---|---|
1.2.3.4 (no prefix) | 1.2.3.4/32 for a single IP, or 1.2.3.0/24 for a /24 |
1.2.3.4/0 (zero prefix on a non-zero address) | 0.0.0.0/0 if you mean “any” |
1.2.3.4/33 | Max prefix is /32 for IPv4, /128 for IPv6 |
1.2.3.4/255.255.255.0 (netmask) | Use CIDR notation: 1.2.3.0/24 |
A hostname (e.g. office.example.com) | Resolve to IP yourself; CIDR field doesn’t accept names |
Save fails with `too many rules`
Save fails with `too many rules`
- Combine rules where you can —
80,443in one row instead of two;3000:4000instead of forty single-port rules - Split into multiple Firewall Groups if you genuinely need more — attach all of them to the same VM IP. The allow lists union, so two groups of 40 = 80 effective rules
- Use a Firewall Appliance (OPNsense) inside a VPC for unlimited rule complexity; the public Default + your group apply to the public interface; OPNsense applies to anything routed through the VPC
Save fails with `name already exists`
Save fails with `name already exists`
Locked out
I attached a Deny All / SSH-restricted group and now I can't SSH in
I attached a Deny All / SSH-restricted group and now I can't SSH in
- VNC console — every VM has a built-in browser console that bypasses the network entirely. From the VM detail page → Console action. Log in with the VM’s password (or reset the password first if you don’t know it). From the console, fix the firewall: detach the restrictive group with
raff-cli firewall detach …, or if you don’t have the CLI in the VM, use the dashboard from another browser tab. - Detach the restrictive group from the dashboard — VM detail page → Network tab → IP card → Detach firewall. Then reboot the VM. The system Default Firewall is still applied (which allows SSH); you should regain access on the next boot.
- Attach an SSH-only group — create / pick a Firewall Group with at least
TCP 22 from 0.0.0.0/0(or your office IP), attach it to the VM, reboot. Now SSH works again, then iterate on the rules from a stable baseline.
My RDP / SSH stops working after a firewall edit
My RDP / SSH stops working after a firewall edit
- Your office’s public IP changed. Most ISPs give residential / office customers dynamic IPs. The CIDR you whitelisted six months ago may not be your current egress IP. Check
curl ifconfig.mefrom your client and update the rule’s Source field - You’re connecting via VPN — the source IP is the VPN’s egress, not your local IP. Whitelist the VPN range
- You disabled the rule rather than removing it (or vice versa) — the dashboard doesn’t have a per-rule “disable” toggle; rules are either present (allow) or absent (deny). Add the rule back fresh
Attach, detach, delete
Delete is greyed out / blocked
Delete is greyed out / blocked
⋮ menu unblocks Delete.See Delete a Firewall Group for the full flow.Assign to VM picker is empty
Assign to VM picker is empty
- VMs without a public IP can’t have a Firewall Group attached. Firewall Groups apply to public traffic only; VPC-only VMs aren’t in the picker. To filter VPC traffic, deploy a Firewall Appliance gateway on the VPC instead
- All VMs in the region already have this group. The picker filters out duplicates
- Wrong region selected — switch the top-bar region selector
Port forwarding interaction
Port forwarding stops working after I attached a Firewall Group to my Platform Router VM
Port forwarding stops working after I attached a Firewall Group to my Platform Router VM
Still stuck?
Email support@rafftechnologies.com with:- The Firewall Group ID and name
- The VM ID that’s affected
- What you expect to work and what’s actually happening — exact ports, source IPs, protocols
- Whether you’ve rebooted the VM since the firewall change (this resolves ~80% of tickets — try it first)