Enabling Plesk Firewall
Enabling Plesk Firewall
Firewall is a protection measure aimed at prohibiting specific incoming network connections that may be used to compromise your server.
Plesk Firewall operates on the base of rules, which specify parameters of connections, which are to be blocked or passed through.
It filters only incoming IP connections for TCP and UDP protocols. All outcoming connections are allowed. Each rule controls filtering only for one specific network interface (adapter).
Some rules for widespread protocols are predefined, and you can only enable or disable them.
Note, that if some protocol is not controlled by some rule, its messages are filtered too. For example, if you do not have a rule for protocol XYZ, all incoming messages sent via this protocol will not be passed by Plesk Firewall.
This behavior has an exception, Plesk Firewall does not filter both incoming and outcoming messages of ICMP protocol, regardless of message's type.
To start setting up the firewall, click the Server > IP Addresses > Firewall icon.The page allows seeing and changing status of firewall protection for the network interfaces installed on the server.
This page has a list of all network interfaces on server accompanied by icons symbolizing status of firewall protection (F column), status of network interface connection activity (I column), and textual fields for name and type of network interface.
Click the icon in the F column to switch the status of firewall protection for the corresponding network interface.
Click the interface name for opening a page, which gives you precise control over firewall rules for this interface.
A rule has a symbolic name and consists of port number and protocol name for the connection to be filtered or passed through.
The Default button restores the original Plesk Firewall configuration by deleting all user-defined rules and setting all predefined rules in pass-through state.
The Panic button enables special mode to protect the server from unknown worms, etc. It closes the server as tightly as possible, disabling all incoming and outgoing connections except for accessing Plesk Control Panel and Remote Desktop administering. Note that the panic mode disables access to the client's sites; it is only recommended to use it when there are no other options left, e.g. if the server was compromised.
The Enable/Disable button allows controlling firewall activity on the network interface you selected before entering this page.
The list at the bottom of the page contains all firewall rules, registered for use on the selected network interface. Each rule has an icon in the S column, which indicates the state of this rule, whether it is enabled or disabled. When the icon is green, Plesk Firewall does not filter messages of the protocol, corresponding to the rule, passing them through to concrete programs using this protocol for communication. When it is red, firewall rule is 'active', prohibiting messages matching the rule to pass through. To edit parameters of an existing rule, click on its name.
To add your own rule, click the Add Firewall Rule button. A page will open where you have to specify rule's properties. To edit properties of an existing rule, click on its name. The screen of editing an existing rule is very similar to the screen of adding a new rule, except that it does not allow renaming the rule.
Business VoIP Providers