What's new. We are rolling out a managed, network-level firewall across all VPSDime Linux VPSs. A small, curated set of application ports that are the most frequent malware entry points (PostgreSQL, MongoDB, Redis, Memcached, Elasticsearch, and a handful of others) is now blocked at our network edge by default. Standard services such as SSH, HTTP, and HTTPS are not affected.
How to allow access. Every VPS has a new Firewall section in its management page with two tools:
Your own VPSs in our fleet already talk to each other without restriction - inter-VPS traffic is whitelisted automatically.
Prefer to handle firewalling yourself? You can turn the managed firewall off on a per-VPS basis, using the Turn off firewall protection and Turn on firewall protection buttons on the same page. Your per-app and global whitelists are preserved and become active again the moment you turn it back on.
Limits. Up to 64 entries per list. IPv4 subnets accepted up to /16; IPv6 up to /48. Catch-alls (0.0.0.0/0, ::/0) are not allowed. Changes apply instantly, no restart needed.
Action. If you run any of the affected services on one of your VPSs, open its Firewall page in the client area, review the whitelist, and add any sources that need access. Full details in our How to use the network firewall article.