Troubleshooting guide for identifying and resolving firewall-related connectivity issues with Vultr Compute instances.
If you're experiencing connection issues with your Vultr Compute instance, the problem may be due to a misconfigured firewall. Misconfigured rules can prevent your server from accepting incoming or initiating outgoing traffic. On Vultr you can configure instance level firewall or a Firewall Group:
iptables
, ufw
, or firewalld
, configured directly on the OS.Check both layers to diagnose and resolve connectivity issues.
Vultr instances running Linux have iptables
installed by default. To check if any firewall rules are active, run:
$ sudo iptables -L
No Active Rules (Firewall Not Filtering Traffic)
Chain INPUT (policy ACCEPT)
Chain FORWARD (policy ACCEPT)
Chain OUTPUT (policy ACCEPT)
If the output is like this, your instance is not blocking any connections at the OS level. In this case, check your Vultr Firewall Group settings.
Active Rules (Firewall Filtering Traffic)
Chain INPUT (policy DROP)
...
ACCEPT tcp -- anywhere anywhere tcp dpt:2222
If the policy is DROP
or certain ports are explicitly allowed, then filtering is active. Proceed to inspect using UFW or FirewallD.
If you're using conflicting firewall rules and need to reset:
$ sudo iptables -P INPUT ACCEPT
$ sudo iptables -P OUTPUT ACCEPT
$ sudo iptables -P FORWARD ACCEPT
$ sudo iptables -F
And for IPv6:
$ sudo ip6tables -P INPUT ACCEPT
$ sudo ip6tables -P OUTPUT ACCEPT
$ sudo ip6tables -P FORWARD ACCEPT
$ sudo ip6tables -F
If your instance uses UFW (common on Ubuntu), run:
$ sudo ufw status verbose
Sample Output:
Status: active
Logging: on (low)
Default: deny (incoming), allow (outgoing), deny (routed)
New profiles: skip
To Action From
-- ------ ----
3001 ALLOW IN Anywhere
80 ALLOW IN Anywhere
443 ALLOW IN Anywhere
22/tcp (OpenSSH) ALLOW IN Anywhere
This means only the listed ports (e.g., 22
, 80
, 443
, 3001
) are allowed, and all other incoming connections are denied by default.
If you want to disable UFW temporarily:
$ sudo ufw disable
You can modify UFW rules to match your application's needs using:
$ sudo ufw allow <port>/<protocol>
Some Linux distributions (CentOS, Rocky, AlmaLinux) use firewalld
.
Check the firewalld status.
$ sudo firewall-cmd --state
If running
, list active zones:
$ sudo firewall-cmd --get-active-zones
List rules in a zone:
$ sudo firewall-cmd --info-zone=public
Stop and disable firewalld if needed:
$ sudo systemctl stop firewalld
$ sudo systemctl disable firewalld
If your instance is attached to a Vultr Firewall Group:
22/tcp
for SSH) are open.