docs/content/guides/admin.md
Enable server-side firewall filtering to enforce network access restrictions per client.
When enabled, each client can have custom "Firewall Allowed IPs" configured that restrict which destinations they can access through the VPN. These restrictions are enforced by the server using iptables/ip6tables and cannot be bypassed by the client.
/// warning | Experimental Feature
This feature is currently experimental. While functional, it should be thoroughly tested in your environment before relying on it for production security requirements. Always verify that firewall rules are working as expected using test traffic or by manually inspecting the rules.
///
Requirements:
iptables must be installed on the host systemip6tables must be installed if IPv6 is enabled (default)/// note
Most Linux distributions include iptables by default. If you're running in a minimal container environment, you may need to install the iptables package on the host system.
///
Enable this feature if you want to:
How it works:
See Edit Client → Firewall Allowed IPs for detailed configuration syntax and examples.