How to Isolate and Block Network Threats

Follow this manual to manage specific IP addresses that are allowed to access your server or blocked from communicating with it.

Step 1: Whitelisting a Trusted IP

If you have a static IP for your office or home, whitelisting it ensures you never get blocked by the automated security engine:

  1. Navigate to the "IP Filtering" tab.
  2. Enter your IPv4/IPv6 Address.
  3. Set Action to ALLOW.
  4. Add a comment like Office Static IP for auditing.

Step 2: Blacklisting Malicious Entities

If you detect brute-force attacks from a specific range:

  1. Enter the Malicious IP or CIDR block (e.g., 1.2.3.0/24).
  2. Set Action to DENY.
  3. Click "Execute Block". The Booston-Core will instantly sever all neural links from that IP.
[IMAGE_PLACE_HOLDER: IP Filter Step - Screenshot of the IP blocking interface with action history.]

Step 3: Managing the Access Ledger

The Access Ledger displays all active IP rules. You can search by IP or comment, and use the Trash Icon to remove a rule and restore standard access instantly.

PRO TIP: Use the "My IP" shortcut button to instantly identify your current connection address for rapid whitelisting.