Skip to main content

Firewall EDGE Configuration

Firewall EDGE is an advanced perimeter security tool that filters and monitors incoming traffic from the global internet. Its main functions include blocking unwanted traffic, analyzing attacks, and controlling access at multiple levels—from the IP layer through ports and protocols, to entire countries and Autonomous System Numbers (ASN).

The management panel consists of clearly divided tabs:

  • Attack History – review and analyze detected attacks with the option to download traffic samples
  • Traffic – real-time overview and analysis of network traffic with IP filtering and charts
  • Filtering – configure precise access rules for selected protocols and ports
  • General Settings – control the default firewall action and choose operating modes
  • RevDNS – reverse IP-to-domain resolution (PTR)
  • Countries & ASN – filter traffic based on geographic location or network operator numbers

Attack History

Main Metrics

The system displays three key metrics:

  • Average PPS – average packets per second during attacks
  • Average BPS – average bits per second during attacks
  • Total Attack Count – total number of recorded attacks

Detailed Attack Information

When attacks are detected, a list is displayed containing:

  • Unique event ID
  • Start and end date/time of the attack
  • Peak BPS and PPS values recorded during the event

Clicking the attack ID reveals additional statistics:

  • Number of unique IP addresses involved
  • Unique source countries
  • Unique networks (ASN)
  • Source ports and their counts
  • Packet count in the traffic sample
TIP:

The system also allows downloading a PCAP traffic sample for further analysis.


Traffic

This tab is used for monitoring current and historical incoming traffic.

Configuration Options

  • Time Range – up to a 3-hour analysis period
  • Traffic Filtering:
    • Include only specified IP addresses (comma-separated)
    • Exclude specified IP addresses

Quick Time Ranges

Predefined intervals for quick overview:

  • Last 15 minutes
  • Last 30 minutes
  • Last 60 minutes
  • Last 180 minutes

Visualization

Data is presented in a chart showing:

  • Packet count over time
  • Traffic volume in Mbps (megabits per second)

Filtering

This tab allows creating precise rules to block or allow specific types of traffic based on ports and protocols.

Adding a New Filter

  1. Scroll down to Add new filter
  2. Select a protocol:
    • TCP
    • UDP
    • GRE
    • ICMP

Protocol Filtering Options

TCP i UDP:

  • Presets for popular applications (e.g., FiveM)
  • Generic options: allow, deny

GRE:

  • drop GRE
  • bypass protection

ICMP:

  • allow, drop, anycast

Port Configuration

Set filters for:

  • Single port
  • Port range

After configuration, click Create Filter to add the rule.

WARNING:

Only one filter can be created per port. Attempting to add another filter on the same port will result in an error.

Countries & ASN

Filters labeled [Country/ASN] allow blocking or allowing traffic from selected countries or ASNs in the Countries & ASN tab.


General Settings

Define default actions for unfiltered traffic and select a preset configuration.

Default Action

Defines the firewall’s response to traffic on ports without an assigned filter:

FILTER – preliminarily analyze and monitor traffic on all ports
DROP – automatically block traffic on unfiltered ports

WARNING:

Setting DROP may disrupt services if no filters are defined. Use with caution.

Firewall Presets

Automatic

  • Auto-detects active ports
  • Assigns filters automatically
  • May require calibration time

Gaming

  • Recommended for game servers
  • Less aggressive filtering

Basic

  • Minimal protection
  • Good starting point

Reset Settings

Click "Reset settings" to restore defaults.

WARNING:

Reset removes all custom filters, preset changes, and configurations from other tabs.


RevDNS

This tab contains a field to enter a domain to associate with the server’s IP via a PTR record.

Reverse DNS translates an IP address to a domain name (e.g., 123.123.123.123host.example.com). In firewall contexts, it helps identify traffic sources and is commonly used in mail server verification.


Countries & ASN

Configure access control based on IP geolocation (countries) and ASN numbers.

Country Filtering

  1. Select mode:
    • Blacklist – block traffic from selected countries; remaining traffic allowed
    • Whitelist – allow only traffic from selected countries; remaining traffic blocked
  2. Choose countries from the list

ASN Filtering

  1. Select mode:
    • Blacklist – block specified ASN numbers
    • Whitelist – allow only specified ASN numbers
  2. Add ASN numbers manually

ASN numbers can be obtained from public databases such as:

Search an IP to find its assigned ASN.