Documentation

Visit Our xCloud Knowledge Base

Here is your one-stop source for in-depth articles, FAQs, and tutorials for you to excel at hosting & managing your websites.


How to Restrict SSH Access Lockdown on Your Server?

Securing SSH access is a critical step in protecting your server from unauthorized access. By default, SSH is often accessible from any IP address, which can expose the server to brute-force attacks and other security risks. 

The SSH Restriction & Firewall IP Whitelisting System is a security feature designed to significantly reduce unauthorized access to servers by restricting SSH (port 22) access to a predefined set of trusted IP addresses only.

This system removes the commonly used but insecure “SSH (22) – Any” firewall rule and replaces it with a strict IP-based access control model. Only xCloud infrastructure and user-approved IP addresses are allowed to initiate SSH connections.

Follow the process for safely removing the default SSH firewall rule and restricting access to approved IP addresses, while ensuring that you do not lose access to your server.

Step 1: Navigate to Your Server #

Begin by logging in to your server dashboard and selecting the server you want to secure. Once inside the server panel, navigate to ‘Security’, then open ‘Firewall Management’.

Here you will see all active firewall rules applied to your server, including the default SSH rule that permits access from any IP address.

Step 2: Delete the SSH Firewall Rule #

In the ‘Firewall Management’ page, locate the firewall rule labeled ‘SSH’, which typically allows inbound traffic on port 22 from all IP addresses. Click the ‘Delete’ icon next to this rule to begin the removal process.

At this stage, the system will show a confirmation popup containing several critical warnings. These warnings are designed to ensure that you fully understand the impact of deleting the SSH rule.

Step 3: Review and Confirm Safety Warnings #

When attempting to delete the SSH firewall rule, you will be presented with important system warnings explaining that removing this rule will immediately revoke SSH access for all IP addresses.

To prevent accidental lockouts, the platform requires explicit confirmation of safety measures before allowing the SSH rule to be deleted. As part of this process:

  • Infrastructure IP addresses will be automatically whitelisted to ensure that monitoring, backups, and emergency recovery services remain functional.
  • xCloud infrastructure IP addresses will be automatically whitelisted, as they are mandatory to ensure that monitoring, backups, and emergency recovery services remain functional.Optionally, you may choose to whitelist your current public IP address. This option is user-controlled and can be enabled or disabled based on your preference. If selected, your public IP will be added to the whitelist so you retain SSH access after the rule is removed. If not selected, SSH access from your current IP will also be revoked.

You must carefully read the warnings, acknowledge them by checking the required confirmation boxes. 

The SSH firewall rule cannot be deleted until all required safety confirmations have been acknowledged. Once confirmed, the system will automatically whitelist the necessary infrastructure IPs along with your current IP address(Optional).

After reviewing all warnings and confirming the safeguards, proceed by selecting “I Understand and Delete Anyway.” The system will then remove the insecure SSH (port 22 – Any) firewall rule and immediately apply the new IP-based access restrictions.

Restrict SSH Access Lockdown

Once the process is complete, SSH access to your server will be fully restricted. Only approved IP addresses will be able to initiate SSH connections.

Re-Enabling SSH Access (If Needed) #

To re-enable SSH access, navigate to the firewall dashboard and click Add New Rule. A popup window will appear where you need to enter SSH in the Name field and 22 in the Port field.

In the ‘IP Address‘ field, you can specify a particular IP address to whitelist it, or leave the field blank to allow SSH access from all IP addresses. Next, set the ‘Protocol’ to ‘TCP’ and configure ‘Traffic‘ as ‘Allow’. Once all details are entered, click ‘Add Rule’ to apply the changes and restore SSH access to your server.

And that’s it. With these steps, you can easily restrict SSH access to approved IP addresses only or later re-enable, improving server security while maintaining uninterrupted access.

What are your feelings

Updated on January 6, 2026

Server Name

RAM

SSD

xCloud Provider Price/m
(For LTD users)

VULTR Price/m

DO Price/m

Newcomer

1GB

25GB

$4.50

$5.00

$6.00

Basic

2GB

55GB

$9.00

$10

$12.00

Standard

4GB

80GB

$18.00

$20

$24.00

Professional

8GB

160GB

$36.00

$40

$48.00

Business

16GB

320GB

$72.00

$80

$96.00

Server Name

RAM

SSD/NVMe

xCloud Provider Price/m
(For LTD users)

VULTR Price/m

DO Price/m

Lite

1GB

32GB

$5.40

$6.00

$8.00

Personal

2GB

88GB

$16.20

$18.00

$24.00

Growing

4GB

128GB

$21.60

$24.00

$32.00

Elite

8GB

256GB

$43.20

$48.00

$64.00

Titanium

8GB

384GB

$86.40

$96.00

$96.00

Ultimate

32GB

512GB

$172.80

$192.00

$192.00