Firewall Management
Fail2Ban & UFW.
Managed from one UI.
View jails, ban attacking IPs, manage firewall rules, and auto-install security tools — all from the HostAtlas dashboard. No SSH session needed. The agent handles everything on the server.
Fail2Ban
See every jail. Ban any IP.
The Firewall tab on every server shows all Fail2Ban jails with their status, banned IPs, and configuration. Expand a jail to see who's banned and unban with one click. Ban any IP manually with a custom duration.
- check_circle Jail overview: name, status, filter, banned count, total bans, ban time
- check_circle Expandable jail details with banned IP list and unban button
- check_circle Manual ban form: IP, jail selector, duration (10m to 1 week)
- check_circle Enable/disable jails remotely
- check_circle Ban event history with source tracking (auto vs manual)
Jails
4
Active
3
Banned
12
24h
47
UFW Firewall
Your firewall rules. Visual and editable.
See every UFW rule at a glance — port, action, source, and comment. Add new rules, delete existing ones, or toggle the entire firewall. The agent validates every action including an SSH safety check before enabling UFW.
- check_circle Full rule table with numbered entries
- check_circle Add rules: action, port, protocol, source IP, comment
- check_circle Delete rules with confirmation
- check_circle Enable/disable with SSH lockout protection
- check_circle Default policy display (incoming/outgoing/routed)
Auto-Setup
Not installed? One click fixes that.
If Fail2Ban or UFW isn't installed on a server, HostAtlas shows an install button. One click and the agent installs the package, configures sane defaults, and starts the service. For UFW, SSH is always allowed automatically to prevent lockouts.
Click install
One button in the Firewall tab. Works on Debian, Ubuntu, RHEL, CentOS, and Fedora.
Agent configures
Fail2Ban: sshd jail enabled, maxretry=5, bantime=1h. UFW: SSH allowed, default deny incoming.
Data appears
Within one discovery cycle, jails and rules populate in the dashboard. Manage everything from the UI.
Attack Mode Integration
See an attack. See what Fail2Ban is doing. React.
When Attack Mode is active, the dashboard shows Fail2Ban status alongside live attack data. See which jails are catching attackers, how many IPs are banned, and use one-click banning through fail2ban or iptables.
Fail2Ban Status in Attack Dashboard
The Attack Mode overview shows a Fail2Ban card with all active jails and their current ban count. See which jails are actively catching attackers in real time.
Multi-Layer Banning
Ban attacking IPs through fail2ban jails, raw iptables/ufw rules, or Cloudflare — all from the same interface. Choose the right tool for the right threat.
Firewall Auto-Setup Automation
Create an automation that auto-installs Fail2Ban and UFW on every new server. Configure default jails, ban times, and firewall rules — applied automatically.
Secure every server from one dashboard.
Install the agent. Fail2Ban and UFW appear in the Firewall tab automatically. Manage, monitor, and protect — no SSH required.
Start free — no credit card