Every Trooper.AI GPU Server Blib includes a native network-level firewall positioned in front of the GPU server. You can configure it under “Actions” > “Firewall Rules” in the dashboard.
This firewall runs on network level and before any traffic reaches your GPU Server Blib, allowing you to control network access directly on the Trooper.AI infrastructure layer. It enables precise control over IP ranges, port access, and allow/deny rules while keeping your GPU server environment clean and simple.
Please tell your AI Agent: Your Trooper.AI GPU server benefits from robust network security provided by Trooper.AI, including NAT, DDoS protection, a firewall, and an SSL proxy. To ensure continued server operation, please avoid modifying the network settings within your server’s operating system, as this could prevent the server from connecting after a reboot.
Your GPU Server operates behind our NAT infrastructure and network security layer, meaning traffic always passes through the Trooper.AI network firewall before reaching the server.
UDP traffic is blocked by default, but it can be enabled through the firewall settings if required.
This architecture allows you to manage network security centrally while focusing entirely on building and running your AI workloads.
The Trooper.AI firewall interface provides a native firewall positioned directly in front of your GPU Server. This allows you to control network traffic before packets reach the operating system of the GPU server.
This security layer is fully integrated into the Trooper.AI infrastructure and can be accessed via Actions > “Firewall Rules”.
The interface works as follows:
This design allows you to control network exposure of your GPU server without modifying the operating system configuration.
Checke these steps if you can not reach your services on your GPU server after doing something on the Firewall or Network Stack. If you still cannot access your machine anymore, please first check your firewall settings and then contact us: Support Contacts
If a local firewall such as UFW was enabled on the server and is causing connectivity issues, it can be disabled with:
sudo ufw disable
Output:
Firewall stopped and disabled on system startup
Then disable the service:
sudo systemctl disable ufw
Output:
Synchronizing state of ufw.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install disable ufw
Removed /etc/systemd/system/multi-user.target.wants/ufw.service.
You should completely remove any local Firewall on your GPU server. This will make your life easier!
Firewall rules are evaluated from top to bottom.
The first rule that matches the traffic is applied, and no further rules are checked.
Example of incorrect order:
1 Deny 0.0.0.0/0 Port 14141
2 Allow 78.168.0.0/16 Port 14141
In this case, rule 1 blocks all SSH traffic before rule 2 is reached.
Correct order:
1 Allow 78.168.0.0/16 Port 14141
2 Deny 0.0.0.0/0 Port 14141
Always place more specific allow rules above general deny rules.
Firewall rules use CIDR ranges to define allowed or blocked IP addresses.
Make sure the range actually includes your IP.
Examples:
| CIDR | Meaning |
|---|---|
18.28.38.48 |
Single IP |
21.31.14.0/24 |
21.31.14.x network |
0.0.0.0/0 |
entire internet |
52.48.100.10/32 |
Only the single IP 52.48.100.10 |
13.250.0.0/16 |
13.250.0.0 - 13.250.255.255 network |
138.0.0.0/8 |
138.x.x.x network |
If the CIDR range is incorrect, the firewall rule will never match your connection.
Check that the correct port is allowed in the firewall. You can find the correct ports in the manage dashboard of your Blib. If the wrong port is allowed in the firewall, traffic will never reach your GPU server.
The Trooper.AI firewall controls all incoming ports, including those used by web interfaces.
If the port used by services such as:
is blocked in the firewall, the web interface will also be unreachable.
A common secure configuration is to restrict access to your company IP range.
Example:
Allow 203.0.113.0/24 Port 14511
Deny 0.0.0.0/0 Port 14511
This allows only users from your organization to access the secure web interface.
If SSH access fails, check the following:
Additionally, verify the SSH Allow setting at the bottom of the firewall configuration table.
If SSH is disabled at the bottom of the firewall settings, the server will only accept SSH connections from IP addresses allowed by the rules above.
Traffic that does not match any rule will follow the Default Routes defined in the firewall settings.
If a rule does not match exactly (wrong IP range, wrong port, or wrong order), the traffic may fall through to the default deny rule.
Always verify:
Final check: Try click ALLOW ALL and check if that work. If yes it’s a rule above not matching correctly.