•  Home
  •  Dashboard
  •  Company
    • About Us
    • Blog
    • Careers
    • Contact Us
    • Data Centers
    • Looking Glass
    • Network
    • Reseller
  •  Hosting Services
    • Backup
    • Content Delivery Network
    • Colocation Hosting
    • Dedicated Hosting
    • DDoS Mitigation
    • IP Transit
    • Private Cloud
    • Wavelength
  •  Solutions
    • Ecommerce
    • Finance
    • Gaming
    • Hosting
    • Management
    • Security
    • System Integrator
  •  Support
    • Community
    • Knowledge Base
    • Open A Ticket
  •  USA & Canada: 800-933-1517
  •  International: 626-549-2801
  •  Email: sales@psychz.net
  • Services
    • Dedicated Servers
    • Colocation
    • Private Cloud
    • DDos Protection
    • IP Transit
    • CDN
    • Backup
  • Solutions
    • Ecommerce
    • Security
    • Gaming
    • Hosting
    • Management
    • Finance
    • System Integrator
  • Dashboard

How to create firewall (Edgelayer) rules?

Trusted By
25,000+ Customers (Since 2001)
  • Home
  • Client
  • Knowledgebase
  • Client Area
  • How to create firewall (Edgelayer) rules?

Table Of Content

Related Articles

  • Disable force password change feature
  • How to Reset Dashboard Password
  • Enabling Multi-Factor Authentication
  • How to temporarily/permanently enable DDoS IP diversion for a Single IP Address?
  • OS Install Overview
  • Operating System Installation through client area
  • How to setup API Access
  • Manage Your Contact
  • How to access your mails?
  • How to create a new ticket?
  • Add a payment method to your existing account
  • How to Update Account Details?
  • Steps to change account password
  • How to mount ISO via IPMI Management Web Interface
  • How To Log Into Client Area?
  • How to access your dedicated server IPMI?
  • How to obtain login information of your dedicated server in client area?
  • How To Check Your Account Credits?
  • Views: (8861)
  • Votes: (13)
Was this article helpful?
VOTE

How to create firewall (Edgelayer) rules?

Publisher: Psychz Networks,  September 18,2017

This article will help you to create Edge Layer ACLs for your network. Please visit the link below to visit the Edge Layer ACL page using the User Id and Password provided to you. This page will show you the list of all the ACLs you have created.

https://www.psychz.net/dashboard/client/web/edgelayeracl

 

  • Step 1: Specify Source IP
  • Step 2: Specify Source Port
  • Step 3: Choosing Device
  • Step 4: Specify Destination Port
  • Step 5: Selecting Protocol Type
  • Step 6: Deficine ICMP Message and Packet Length
  • Step 7: Specify Command 


Create Edgelayeracls - Use this button to create a new Access Control List (ACL). 

 

How to create Edge layer ACL

 

Source IP

Specify the source IP on which you want the operation to be performed. You can specify either a source IP or an IP range. If you leave the field blank, it will block all source IPs for that specific rule.

 

 

Source Port

Specify the source port on which you want the operation to be performed. You can specify either a source port or a port range. If you leave the field blank, it will block all source ports for that specific rule.

 

 

Device 

Please choose the device from the drop-down list for which you want the action to be performed. After selecting the device, the IP range assigned to the device will be displayed. You can either specify the entire IP range or a specific IP of the selected device.

 

 

Destination Port

Please select a specific port or an entire port range for which the action should be performed.

 

 

Protocol

While creating Access Control List, you can choose the protocol on which the action should be performed. Please select from the following protocols. The ACL will perform operations only on the selected protocol.

- UDP
- TCP
- ICMP

 

 

ICMP message and Packet length 

You can specify the ICMP message that you want to filter out. You can also specify the packet length so that any message with inappropriate packet length should be filtered out.

 

 

Command

The command field specifies the operation that you wish to perform on the selected IP range. The operations that you wish to perform are the following - 

- Accept
- Discard
- Rate-limit

 

 

 

 

Hosting Services
  • Dedicated Hosting
  • Colocation Hosting
  • Backup
  • IP Transit
  • DDoS Mitigation
Support
  • Portal Login
  • Knowledgebase
  • Community
Company
  • About Us
  • Contact Us
  • Network
  • Data Centers
  • Looking Glass
  • Affiliates
  • Reseller
  • Blog
Policies
  • Privacy Policy
  • Acceptable Usage Policy
  • Terms and Conditions
  • Service Level Agreement
Company
  • Psychz Networks,
    A Profuse Solutions Company
    611 Wilshire Blvd #300
    Los Angeles,California 90017
    USA
  • US/Canada: 800-933-1517
  • International: 626-549-2801
Subscribe to Our Mailing List
* indicates required
Copyright © 2022 Psychz Networks, A Profuse Solutions Inc Company