Firewall Management

Fail2Ban & UFW.
Managed from one UI.

View jails, ban attacking IPs, manage firewall rules, and auto-install security tools — all from the HostAtlas dashboard. No SSH session needed. The agent handles everything on the server.

Fail2Ban

See every jail. Ban any IP.

The Firewall tab on every server shows all Fail2Ban jails with their status, banned IPs, and configuration. Expand a jail to see who's banned and unban with one click. Ban any IP manually with a custom duration.

  • check_circle Jail overview: name, status, filter, banned count, total bans, ban time
  • check_circle Expandable jail details with banned IP list and unban button
  • check_circle Manual ban form: IP, jail selector, duration (10m to 1 week)
  • check_circle Enable/disable jails remotely
  • check_circle Ban event history with source tracking (auto vs manual)
security Fail2Ban web-prod-01

Jails

4

Active

3

Banned

12

24h

47

sshd on 5 banned 147 total · 1h
nginx-http on 7 banned 89 total · 10m
postfix off 0 12 total · 1d
local_fire_department UFW Firewall Active
Incoming: deny  |  Outgoing: allow  |  Routed: disabled
#
To
Action
From
1
22/tcp
ALLOW IN
Anywhere
2
80/tcp
ALLOW IN
Anywhere
3
443/tcp
ALLOW IN
Anywhere
4
3306/tcp
DENY IN
Anywhere

UFW Firewall

Your firewall rules. Visual and editable.

See every UFW rule at a glance — port, action, source, and comment. Add new rules, delete existing ones, or toggle the entire firewall. The agent validates every action including an SSH safety check before enabling UFW.

  • check_circle Full rule table with numbered entries
  • check_circle Add rules: action, port, protocol, source IP, comment
  • check_circle Delete rules with confirmation
  • check_circle Enable/disable with SSH lockout protection
  • check_circle Default policy display (incoming/outgoing/routed)

Auto-Setup

Not installed? One click fixes that.

If Fail2Ban or UFW isn't installed on a server, HostAtlas shows an install button. One click and the agent installs the package, configures sane defaults, and starts the service. For UFW, SSH is always allowed automatically to prevent lockouts.

1

Click install

One button in the Firewall tab. Works on Debian, Ubuntu, RHEL, CentOS, and Fedora.

2

Agent configures

Fail2Ban: sshd jail enabled, maxretry=5, bantime=1h. UFW: SSH allowed, default deny incoming.

3

Data appears

Within one discovery cycle, jails and rules populate in the dashboard. Manage everything from the UI.

Attack Mode Integration

See an attack. See what Fail2Ban is doing. React.

When Attack Mode is active, the dashboard shows Fail2Ban status alongside live attack data. See which jails are catching attackers, how many IPs are banned, and use one-click banning through fail2ban or iptables.

shield

Fail2Ban Status in Attack Dashboard

The Attack Mode overview shows a Fail2Ban card with all active jails and their current ban count. See which jails are actively catching attackers in real time.

block

Multi-Layer Banning

Ban attacking IPs through fail2ban jails, raw iptables/ufw rules, or Cloudflare — all from the same interface. Choose the right tool for the right threat.

auto_fix_high

Firewall Auto-Setup Automation

Create an automation that auto-installs Fail2Ban and UFW on every new server. Configure default jails, ban times, and firewall rules — applied automatically.

Secure every server from one dashboard.

Install the agent. Fail2Ban and UFW appear in the Firewall tab automatically. Manage, monitor, and protect — no SSH required.

Start free — no credit card