Introduction
Firewall rules control network traffic to and from your cloud resources. They use targets, sources, and protocols to decide what traffic is allowed or blocked.
When you want to allow web traffic only from specific IP addresses to your virtual machines.
When you need to block all incoming traffic except from your office network.
When you want to allow only SSH connections to your servers from trusted sources.
When you want to restrict traffic to a specific protocol like TCP or UDP.
When you want to apply rules only to certain virtual machine instances.