How to Isolate and Block Network Threats
Follow this manual to manage specific IP addresses that are allowed to access your server or blocked from communicating with it.
Step 1: Whitelisting a Trusted IP
If you have a static IP for your office or home, whitelisting it ensures you never get blocked by the automated security engine:
- Navigate to the "IP Filtering" tab.
- Enter your IPv4/IPv6 Address.
- Set Action to ALLOW.
- Add a comment like
Office Static IPfor auditing.
Step 2: Blacklisting Malicious Entities
If you detect brute-force attacks from a specific range:
- Enter the Malicious IP or CIDR block (e.g.,
1.2.3.0/24). - Set Action to DENY.
- Click "Execute Block". The Booston-Core will instantly sever all neural links from that IP.
Step 3: Managing the Access Ledger
The Access Ledger displays all active IP rules. You can search by IP or comment, and use the Trash Icon to remove a rule and restore standard access instantly.
PRO TIP: Use the "My IP" shortcut button to instantly identify your current connection address for rapid whitelisting.