Organization & Security

Department-based organization, intelligent firewall management, and automated security recommendations

Organization & Security

Infinibay organizes virtual machines by departments and automatically applies security policies, firewall rules, and resource quotas. No need for complex network segmentation or manual iptables configuration.

Department-Based Organization

Departments are the primary organizational unit in Infinibay. They group related VMs, inherit security policies, and simplify resource management.

Departments overview

Overview of all departments with VM counts, users, and resource summaries

Why Departments?

Instead of managing individual VMs in isolation, departments provide:

  • Logical Grouping: Organize VMs by team, project, or function (e.g., "Developers", "Marketing", "Test Environment")
  • Inherited Security: Firewall rules and network policies apply to all VMs in the department automatically
  • Resource Quotas (Planned): Set limits on total CPU, memory, and storage per department
  • Access Control (Planned): Users restricted to managing only their department's VMs

Creating Departments

Departments are created from the Departments page:

  1. Click "New Department"
  2. Provide a name and optional description
  3. Select an icon to visually distinguish departments
  4. Configure default firewall rules (optional)

New VMs automatically inherit the department's firewall configuration when created.

Department Features

Each department card shows:

  • Total Computers: Number of VMs in the department
  • Users: Number of users with access
  • Resources: Quick view of allocated CPU, memory, storage

Click any department to view:

  • Computers Tab: All VMs with status indicators
  • Security Tab: Firewall rules and security groups
  • Scripts Tab: Department-specific automation scripts

Department VM view with tabs

Individual department view showing VMs, security settings, and scripts

Firewall Management

Infinibay's firewall system combines simplicity with power. Use pre-configured service presets for common scenarios, or create custom rules with granular control.

Service Presets

Service presets are one-click firewall configurations for common services:

  • Web Server: Allow HTTP (80) and HTTPS (443)
  • SSH: Allow secure shell access (22)
  • RDP: Enable Remote Desktop for Windows VMs (3389)
  • Database: PostgreSQL, MySQL, MongoDB, Redis
  • Development Tools: VS Code Server, Node.js debugger
  • Custom Services: Define your own presets with multiple ports

Department firewall rules

Firewall rules overview showing service presets and custom rules with risk indicators

Rule Types

Infinibay supports two types of firewall rules:

  1. Department Rules: Apply to ALL VMs in the department
  2. VM-Specific Rules: Override or extend department rules for individual machines

Department Rules (Example Above):

  • Block Insecure HTTP: Blocks port 80 (Both Directions, HIGH priority)
  • HTTPS (Secure Web): Allows encrypted HTTPS (443) traffic
  • DNS: Allow DNS queries (UDP 53)
  • Remote Desktop (RDP): Allow incoming RDP connections

Rule Attributes

Each rule displays:

  • Action: βœ… Allow or 🚫 Block
  • Direction: Incoming, Outgoing, or Both
  • Protocol: TCP, UDP, ICMP
  • Ports: Service port numbers
  • Priority: HIGH, MEDIUM, LOW (determines rule precedence)
  • Risk Level: Visual indicator of security impact

Creating Firewall Rules

Click "+ Add Rule" to open the rule creation dialog:

Department firewall rule modal

Modal for creating service-based firewall rules

Simple Mode (Service Presets)

  1. Select a service from the dropdown (e.g., "Web Server", "SSH")
  2. Provide a rule name (auto-generated from service)
  3. Choose action (Allow/Block traffic)
  4. Click "Create Department Rule"

The system automatically:

  • Configures correct ports and protocols
  • Sets appropriate priorities
  • Applies risk assessment
  • Updates all VMs in the department

Advanced Mode

For custom rules, switch to Advanced Mode to manually specify:

  • Source/destination IP ranges
  • Custom port ranges
  • Protocol-specific options (TCP flags, ICMP types)
  • Connection tracking options

Firewall Rule Inheritance

VMs inherit department rules but can override them:

Department Rule: Block HTTP (port 80)
   β”œβ”€ VM "web-server-01": Allow HTTP (VM-specific override)
   β”œβ”€ VM "database-01": Inherits block (no override)
   └─ VM "dev-machine": Inherits block (no override)

Override Behavior:

  • VM-specific rules always take precedence
  • Department rules apply to VMs without overrides
  • Changing a department rule updates all inheriting VMs instantly

VM Override Warning

When a VM has rules that conflict with department defaults, Infinibay displays a warning:

VM Override Notice

Individual VMs can override these department rules by creating VM-specific rules with the "Override Department" flag. This is useful for VMs that require special security configurations.

Use overrides sparinglyβ€”they reduce consistency and make auditing harder.

Intelligent Firewall Features

Infinibay's firewall goes beyond simple allow/block rules with intelligent features:

1. Automatic Risk Assessment

Every rule is automatically analyzed for security risks:

  • HIGH Risk: Allows insecure protocols (HTTP, Telnet, FTP) or exposes sensitive services
  • MEDIUM Risk: Broad port ranges or bidirectional traffic
  • LOW Risk: Standard encrypted services (HTTPS, SSH) with specific ports

Risk indicators help administrators make informed decisions without being security experts.

2. Conflict Detection

When creating a rule, Infinibay checks for conflicts:

  • Duplicate Rules: Warns if an identical rule already exists
  • Contradictory Rules: Detects allow/block conflicts on same port
  • Shadowed Rules: Identifies rules that will never match due to priority

Conflicts are highlighted with actionable suggestions (e.g., "Merge with existing rule #42").

3. Blocked Connection Tracking

Infinibay monitors and logs blocked connection attempts:

  • Source IPs: Where blocked traffic originated
  • Destination Ports: What services were targeted
  • Frequency: How many attempts occurred
  • Recommendations: Suggests creating rules if legitimate traffic is blocked

Access blocked connection logs from Department β†’ Security β†’ Blocked Connections.

4. Service Discovery

When creating a VM with applications (e.g., "Web Server", "Database"), Infinibay automatically:

  1. Detects required network ports
  2. Suggests firewall rules
  3. Prompts for approval before applying

Example:

Installing "PostgreSQL" requires:
  - Allow TCP 5432 (incoming)
  - Allow UDP 5353 (mDNS discovery)

Apply these rules to department "Developers"? [Yes] [No] [Customize]

Automated Recommendation System

Infinibay continuously monitors your infrastructure and provides proactive recommendations to improve performance, security, and resource utilization.

Recommendation Categories

1. Resource Warnings

Infinibay alerts you to resource constraints before they cause problems:

  • Low Memory: VM has less than 10% free RAM
  • High CPU Usage: Sustained >90% CPU usage for 10+ minutes
  • Disk Space: Storage pool or VM disk >85% full
  • Resource Contention: Multiple VMs competing for same CPU cores

Example Alert:

⚠️ Resource Warning: "web-server-01"

Memory usage at 94% (7.5 GB / 8 GB).
Recommendation: Increase memory allocation to 12 GB or investigate memory leaks.

[View Details]

2. Security Recommendations

The system analyzes firewall rules and network traffic to suggest security improvements:

  • Unused Open Ports: Ports allowed by firewall but never accessed
  • Insecure Protocols: HTTP, FTP, Telnet detected in rules
  • Overly Permissive Rules: Rules allowing all IPs or wide port ranges
  • Missing Security Updates: OS patches available for VMs

Example Alert:

πŸ”’ Security Issue: Department "Marketing"

Firewall rule "Allow HTTP" permits insecure web traffic.
6 VMs are exposed to potential man-in-the-middle attacks.

Recommendation: Switch to HTTPS-only (port 443) and block HTTP (port 80).

[View Details] [Configure Firewall]

3. Blocked Connection Insights

When Infinibay detects legitimate traffic being blocked:

  • Pattern Detection: Identifies repeated blocked connections from same source
  • Service Identification: Recognizes common services by port numbers
  • Rule Suggestions: Proposes new firewall rules to allow traffic

Example Alert:

πŸ”₯ Blocked Traffic Detected: "database-vm-02"

PostgreSQL connections (port 5432) from 192.168.1.50 blocked 47 times in last hour.

This appears to be legitimate application traffic from "app-server-01".

Recommendation: Add rule to allow TCP 5432 from 192.168.1.50.

[Configure Port 5432] [View Firewall Rules]

4. Application Performance

Monitors application-specific metrics and suggests optimizations:

  • Slow Database Queries: Detected in PostgreSQL/MySQL logs
  • High Memory Apps: Applications consuming excessive RAM
  • Startup Failures: Services failing to start after reboot
  • Port Conflicts: Multiple apps trying to bind same port

Example Alert:

⚑ Performance Issue: "dev-machine-03"

VS Code Server using 6 GB RAM (75% of VM allocation).

Recommendation: Disable unnecessary extensions or increase VM memory to 10 GB.

[View Details] [View Processes]

Recommendation Actions

Each recommendation provides interactive buttons:

  • View Details: Opens detailed explanation and guidance steps
  • View List: Shows structured data (updates, threats, blocked ports, etc.)
  • Configure: Navigate to relevant settings (e.g., Firewall tab)
  • Auto-Fix (Coming Soon): Automatically apply suggested changes
  • Dismiss (Coming Soon): Hide recommendations or mark as resolved

Recommendation Dashboard

Access all recommendations from:

  • Dashboard: Global view of all alerts across departments
  • Department View: Recommendations specific to one department
  • VM Details: Machine-specific alerts and suggestions

Filter by:

  • Severity: Critical, High, Medium, Low
  • Category: Resources, Security, Performance, Networking
  • Type: Disk Space, CPU, Memory, Security, Updates, etc.

Firewall Performance

Infinibay's firewall uses nftables (Linux) with Redis caching for optimal performance:

  • Rule Application: <100ms for individual VMs, <2s for department-wide changes
  • Cache Hit Rate: 98% for frequently accessed rules (Redis)
  • Scalability: Tested with 500+ VMs and 1000+ firewall rules
  • Graceful Degradation: If Redis is unavailable, falls back to direct nftables queries

Security Best Practices

1. Use Department Rules for Defaults

Define common security policies at the department level:

  • Block all incoming traffic by default
  • Allow only necessary outbound traffic (HTTP/HTTPS, DNS)
  • Enable logging for blocked connections

2. Minimize VM-Specific Overrides

Overrides fragment security policies and make auditing harder. Instead:

  • Create sub-departments for VMs with special requirements
  • Use service presets to standardize common exceptions
  • Document why overrides are necessary (use rule descriptions)

3. Regular Security Audits

Review firewall rules quarterly:

  • Remove unused rules (check "Last Matched" timestamp)
  • Tighten overly permissive rules
  • Update service presets as infrastructure evolves

Infinibay provides Firewall Audit Reports under Department β†’ Security β†’ Audit.

4. Enable Recommendation Alerts

Configure notification preferences in Settings:

  • Email alerts for High and Critical recommendations
  • Weekly digests for Medium and Low issues
  • Slack/Teams integration for real-time alerts