/

Firewall

Block malicious traffic at the network and device level. The Firewall tab provides different capabilities depending on your project type.


Firewall by Project Type

The Firewall tab adapts to your project type:

FeatureOn-Premise / Desktop / MobileCloud / Web / API
Block devicesYes (device-level blocklist)No (use IP/session blocking)
Block botsNoYes (390+ user agents, 21 categories)
Block threat actor IPsNoYes (600M+ IPs, 7 intelligence feeds)
Block by countryNoYes (geo-blocking)
Custom IP blocklistNoYes (single IPs or CIDR ranges)
Custom user agent blocklistNoYes (regex patterns)

All firewall changes apply instantly without restarting your application.


On-Premise Firewall

For Desktop, Mobile, and IoT projects, the Firewall tab shows a Blocked Devices list. Devices can be blocked manually from the Device Details page or automatically by Workflow rules.

ByteHide Monitor On-Premise Firewall showing Blocked Devices table with device name, ID, operating system, block reason, and dateClick to expand

ColumnDescription
Device NameName of the blocked device
Device IDUnique device identifier
Operating SystemOS and version of the device
Block ReasonWhy the device was blocked
Blocked DateWhen the device was blocked
ActionsUnblock button to remove the device from the blocklist

On-Premise Firewall details


Cloud Firewall

For Web and API projects, the Firewall tab provides multiple protection layers that work together to filter malicious traffic before it reaches your application.

ByteHide Monitor Cloud Firewall showing Block Bots, Block Threat Actors, Block Countries cards and custom blocklist optionsClick to expand

LayerDescriptionUpdate Frequency
Block BotsBlock known bot user agents across 21 categoriesStatic list
Block Threat ActorsBlock IPs from 7 threat intelligence feeds (600M+ IPs)Updated daily at midnight
Block CountriesBlock all traffic from specific countriesReal-time
Custom IP BlocklistBlock specific IP addresses or CIDR rangesReal-time
Custom User Agent BlocklistBlock traffic matching custom user agent patternsReal-time

Cloud Firewall details


Next Steps

On-Premise Firewall

Device-level blocking for desktop, mobile, and IoT applications

Cloud Firewall

Block bots, threat actors, countries, IPs, and user agents

Workflow Rules

Automate firewall actions based on detected threats

Previous
Incidences