Admin Panel
Interface Settings
Per-Client Firewall
Enable server-side firewall filtering to enforce network access restrictions per client.
When enabled, each client can have custom "Firewall Allowed IPs" configured that restrict which destinations they can access through the VPN. These restrictions are enforced by the server using iptables/ip6tables and cannot be bypassed by the client.
Experimental Feature
This feature is currently experimental. While functional, it should be thoroughly tested in your environment before relying on it for production security requirements. Always verify that firewall rules are working as expected using test traffic or by manually inspecting the rules.
Requirements:
iptablesmust be installed on the host systemip6tablesmust be installed if IPv6 is enabled (default)- The feature cannot be enabled if these tools are not available
Note
Most Linux distributions include iptables by default. If you're running in a minimal container environment, you may need to install the iptables package on the host system.
Enable this feature if you want to:
- Restrict certain clients to only access specific servers or networks
- Prevent clients from accessing the internet while allowing LAN access
- Enforce port-based restrictions (e.g., only allow HTTP/HTTPS)
- Separate routing configuration from security enforcement
How it works:
- Enable "Per-Client Firewall" in Admin Panel → Interface
- Edit any client to see the new "Firewall Allowed IPs" field
- Specify allowed destinations (IPs, subnets, ports) for that client
- Server enforces these rules automatically
See Edit Client → Firewall Allowed IPs for detailed configuration syntax and examples.