Creating Firewall Groups and Inbound Rules
Firewall groups allow you to define reusable sets of inbound rules and apply them when provisioning devices. You can control which ports are exposed on devices and which other devices or networks can reach them, ensuring that only authorised traffic is permitted.
Firewall groups: a named group of inbound rules that can be attached to one or more devices during provisioning. Each device is provisioned with at least one device group; devices with no explicit selection fall back to the default group.
Inbound rules: allow-only rules that define which traffic can reach a device. All inbound traffic is blocked unless it matches a rule. Each rule is evaluated as:
port AND protocol AND (host OR device group OR device groups OR cidr)Creating a Firewall Group
- Navigate to the Firewall Groups page in the dashboard.
- Click Create Firewall Group.
- Enter a Group name (e.g.
web-access). - Add one or more inbound rules.
- Click Create group.
Inbound Rule Fields
Each inbound rule has the following fields:
- Port:
0,any, a single value (80), a range (200-901), orfragment. - Protocol:
TCP,UDP,ICMP, orANY. Port is ignored forICMP. - Host:
anyor a specific device name. - Device Group: a single required device group that the connecting device must belong to.
- Device Groups (comma separated): an AND match — the connecting device must have all listed groups.
- CIDR: remote network range. Use
0.0.0.0/0for any IPv4,::/0for any IPv6, oranyfor both families.
Each rule must include at least one selector: host, device group, device groups, or CIDR.
Rules can be reordered using the up/down controls and removed with the delete button.