Network Restrictions, Isolation & Abuse Policy
For VPS
Overview
To ensure stability, IP reputation and infrastructure integrity, UP-NETWORK applies structured and transparent network policies across all VPS services.
Our philosophy:
Maximum operational freedom
No artificial port blocking
Strong tenant isolation
Strict abuse enforcement
This document explains:
Port policy
TCP rate limits
Automatic restriction behavior
Network isolation (L2/L3)
Abuse monitoring & suspension process
Port Policy
No Default Port Blocking
By default:
✅ No inbound ports are blocked
✅ No outbound ports are blocked
✅ SMTP (port 25) is open
You are free to operate:
Mail servers
APIs
Game servers
Reverse proxies
Custom applications
We do not impose arbitrary filtering under normal conditions.
Reserved Right to Restrict Ports
UP-NETWORK reserves the right to restrict ports without prior notice if:
Spam activity increases
IP reputation is threatened
Infrastructure stability is impacted
Abuse originates from the VPS
This may include:
Blocking outbound SMTP (port 25)
Temporary filtering of specific ports
Requiring identity verification (KYC)
Restrictions may be applied immediately if necessary to protect the network.
TCP Connection Limits
To prevent abuse scenarios and protect shared infrastructure, per-IP rate limits are enforced.
Default Limits (All VPS)
50,000 concurrent TCP connections
250 new TCP connections per second (CPS)
These limits are sufficient for:
Web platforms
SaaS applications
APIs
Reverse proxies
Mail servers
Game servers
Increased CPS Limit (VPS PRO and Above)
For high-throughput workloads:
CPS limit can be increased up to 500 new connections per second
Available from VPS PRO range and above
No additional cost
Requires technical justification
To request an increase:
Open a support ticket
Provide workload explanation
Specify expected traffic behavior
Each request is reviewed individually.
Automatic Enforcement When Limits Are Exceeded
If the TCP rate limit is exceeded:
🚫 Outbound traffic is automatically restricted or temporarily blocked
✅ Inbound traffic remains fully operational
This means:
Your services remain reachable
Clients can still connect to your VPS
Only outgoing connection bursts are limited
The restriction is:
Automatic
Temporary
Self-recovering after cooldown
This mechanism protects:
Infrastructure stability
IP reputation
Other customers
Repeated excessive violations may trigger manual review.
Network Isolation Model (L2 & L3 Separation)
Default Isolation
All VPS instances are:
Fully isolated at Layer 2
Fully isolated at Layer 3
Strictly segmented per tenant
By default:
❌ You cannot see other VPS
❌ You cannot communicate with other customers
❌ You cannot access internal infrastructure services
❌ No east-west traffic is allowed
Each VPS operates in a completely isolated network environment.
Your VPS can:
Communicate with the public Internet
Receive inbound traffic on its assigned IP
But it cannot communicate with other UP-NETWORK services internally.
This prevents:
Lateral movement attacks
ARP spoofing
Broadcast abuse
Cross-tenant reconnaissance
Isolation is enforced at infrastructure level.
Private Communication Between Your Services
If you need communication between multiple VPS:
Free Private VXLAN Network
We provide:
Private Layer 2 environment
Dedicated /24 internal subnet
High-speed internal communication
Complete isolation from public network
This service is:
✅ Free of charge
✅ Available on request
✅ Secure and isolated
And yes, at UP-NETWORK, we do not charge for unnecessary add-ons.
To request:
Open a support ticket
Specify the VPS involved
Our team deploys your private network
Abuse Monitoring & Blacklist Surveillance
We actively monitor IP reputation.
Automatic monitoring includes:
Spamhaus
Spamcop
Direct abuse reports via email (with evidence)
Monitoring is continuous and automated.
Abuse Handling Procedure
If abusive activity is detected:
A support ticket is automatically opened
The customer is notified
The customer has 24 hours to provide justification and remediation
If no response is received within 24 hours:
The VPS is automatically suspended
No prior warning is required
No refund is issued
This is considered a violation of our General Terms and Conditions.
Repeated abuse may result in permanent termination.
Customer Responsibilities
Customers are responsible for:
Securing their VPS
Preventing compromise
Monitoring outgoing traffic
Keeping software updated
Ensuring lawful use
If a VPS is compromised and generates abuse traffic, responsibility remains with the customer.
Summary
UP-NETWORK provides:
Full port freedom
Transparent TCP limits
Automatic outbound-only restriction when limits are exceeded
Strong L2/L3 isolation
Free private networking on request
Strict abuse enforcement
Our goal is to offer secure, high-performance infrastructure with maximum operational freedom — while protecting network integrity.
Need Assistance?
[email protected] Client Area: https://manager.up-network.ch
Our team is available for limit adjustments or technical clarification.
Last updated