Servers
GPU Server Dedicated Server VPS Server
AI Hosting
GPT-OSS DeepSeek LLaMA Stable Diffusion Whisper
App Hosting
Odoo MySQL WordPress Node.js
Resources
Documentation FAQs Blog
Log In Sign Up
Servers

Configure Oracle Firewall for Minecraft Ports in 10 Steps

Setting up a Minecraft server on Oracle Cloud requires precise firewall configuration to allow player connections. This guide walks you through configuring Oracle Firewall for Minecraft Ports using OCI console and server tools. Follow these steps for secure, reliable access without connection issues.

Marcus Chen
Cloud Infrastructure Engineer
7 min read

Hosting a Minecraft server on Oracle Cloud demands careful attention to network security. To Configure Oracle Firewall for Minecraft Ports, you must open specific ports like TCP/UDP 25565 for Java Edition and UDP 19132 for Bedrock. This ensures players can join without timeouts or blocks.

Oracle Cloud uses Security Lists and Network Security Groups alongside server firewalls like UFW or firewalld. Misconfiguring these blocks traffic, causing “Connection refused” errors. In my experience deploying servers on Oracle Free Tier, proper setup cuts latency and boosts uptime for 20+ player worlds.

Whether you’re running vanilla Minecraft, modded packs, or proxies like Geyser, mastering how to configure Oracle Firewall for Minecraft Ports is essential. This 10-step list breaks it down for Ubuntu or Oracle Linux instances, tying into Java installs and optimizations.

Configure Oracle Firewall For Minecraft Ports – Step 1 – Access Oracle Cloud Console

Log into your Oracle Cloud Infrastructure (OCI) console at cloud.oracle.com. Select your compartment containing the Minecraft instance. This is the starting point to configure Oracle Firewall for Minecraft Ports.

Navigate to Compute > Instances. Click your Ubuntu or Oracle Linux VM used for the server. Note the public IP—players will connect here. Always verify you’re in the right region for low-latency play, like US West for North American users.

From instance details, find “Attached VNICs” under Resources. Click the primary VNIC link. This leads to subnet settings where firewall rules live. Skipping this causes port blocks despite server-side opens.

Configure Oracle Firewall For Minecraft Ports – Step 2 – Locate Your Instance VNIC

Your Virtual Network Interface Card (VNIC) controls inbound traffic. In the VNIC details, click the Subnet link. Here begins the process to configure Oracle Firewall for Minecraft Ports at the network level.

Subnets link to Security Lists, Oracle’s stateful firewall. Default lists block non-explicit traffic. For Minecraft on Free Tier ARM instances (like Ampere A1), ensure VNIC is in a public subnet.

Pro tip: Create a custom Security List for Minecraft to avoid touching defaults. Assign it to your subnet later. This isolates configure Oracle Firewall for Minecraft Ports rules from other resources.

Configure Oracle Firewall For Minecraft Ports – Step 3 – Navigate to Subnet Security List

In Subnet details, expand Resources > Security Lists. Select “Default Security List for [subnet-name]”. Click “Add Ingress Rules” to start configuring. This is core to configure Oracle Firewall for Minecraft Ports.

Set Source Type to CIDR. Use 0.0.0.0/0 for global access—ideal for public servers. Stateless rules suit Minecraft’s TCP handshakes. Save rules; changes propagate in seconds.

Image: Configure Oracle Firewall for Minecraft Ports - Adding ingress rules in OCI subnet security list interface. Verify no overlaps with existing SSH (port 22) rules.

Step 4 – Understand Minecraft Ports

Minecraft Java uses TCP/UDP 25565 by default. Bedrock needs UDP 19132. RCON (remote console) is TCP 25575. Query port TCP/UDP 25565 aids server lists.

To fully configure Oracle Firewall for Minecraft Ports, open both protocols for 25565. Mods like Dynmap (default 8123/TCP) or voice chat add extras. Geyser proxy for cross-play requires 19132/UDP inbound.

Free Tier limits (4 OCPUs, 24GB RAM) handle 10-20 players if ports are right. Document your server.properties ports first—mismatches cause join fails.

Step 5 – Add Ingress Rules for Java Edition

Click Add Ingress Rules. Rule 1: Stateless=No, Source CIDR=0.0.0.0/0, IP Protocol=TCP, Destination Port=25565. Repeat for UDP. This step lets you configure Oracle Firewall for Minecraft Ports precisely.

Add RCON: TCP 25575. Enable if using plugins like LuckPerms. Set Description: “Minecraft Java Server”. Commit rules. Test with telnet public-ip 25565 from local machine.

For high-traffic servers, consider Network Security Groups (NSGs) for instance-level control. NSGs complement Security Lists in advanced configure Oracle Firewall for Minecraft Ports setups.

Verify Rules Applied

Refresh Security List. See new rules under Ingress Rules tab. Status should show active. OCI applies instantly—no reboot needed.

Step 6 – Configure Firewall for Bedrock Edition

For Bedrock or Geyser, add UDP 19132 ingress. Source 0.0.0.0/0, Protocol=UDP, Port Range=19132-19132. Essential when learning to configure Oracle Firewall for Minecraft Ports for multi-edition.

Bedrock Edition scales better on Oracle ARM. Pair with Floodgate plugin for Java-Bedrock unity. Avoid OVH-like game firewalls; OCI is flexible.

Image: Configure Oracle Firewall for Minecraft Ports - Bedrock UDP 19132 ingress rule in OCI console. Test via Minecraft Bedrock client.

Step 7 – Open Additional Ports for Mods

Mods demand extras: BlueMap (8100/TCP), Crafty webUI (8443/TCP), Dynmap (8123/TCP). Systematically configure Oracle Firewall for Minecraft Ports for each in Ingress Rules.

Voice chat like Plasmo Voice uses 24454/UDP. Proxies (e.g., Velocity) forward 25565 but listen on custom. List all in server docs before OCI changes.

Limit sources for security: Use specific IPs for webUIs (e.g., your home CIDR). Balances openness with safety in configure Oracle Firewall for Minecraft Ports.

Step 8 – Setup Server Firewall with UFW

OCI Security Lists aren’t enough—server OS blocks too. On Ubuntu: sudo apt install ufw. Then: sudo ufw default deny incoming; sudo ufw default allow outgoing; sudo ufw limit ssh; sudo ufw limit 25565/tcp; sudo ufw limit 25565/udp; sudo ufw enable.

This complements OCI to fully configure Oracle Firewall for Minecraft Ports. Rate-limit prevents DDoS. Add 19132/udp for Bedrock: sudo ufw limit 19132/udp.

Persist rules: sudo ufw status verbose. Reload on boot. Ties into Java/Minecraft installs on Oracle Ubuntu.

Step 9 – Configure firewalld on Oracle Linux

For Oracle Linux: sudo dnf install firewalld; sudo systemctl enable –now firewalld. Add ports: sudo firewall-cmd –permanent –zone=public –add-port=25565/tcp; –add-port=25565/udp; –add-port=19132/udp; sudo firewall-cmd –reload.

Zone=public suits public Minecraft. This layer ensures you can configure Oracle Firewall for Minecraft Ports end-to-end. Check: sudo firewall-cmd –list-all.

Advanced: Custom zones for Minecraft traffic. Integrates with low-latency VM optimizations.

Step 10 – Test and Troubleshoot Ports

Use nmap -p 25565 public-ip or online tools like yougetsignal.com. Minecraft client test: Add server, join. Fails? Check OCI rules, UFW/firewalld, server.properties port.

Common issues: UDP ignored (Minecraft needs both), SSH lockout (always allow 22 first), Free Tier egress limits (rare). Logs: journalctl -u minecraft or tail server.log.

Finalize configure Oracle Firewall for Minecraft Ports with persistent rules. Relate to crash troubleshooting: Closed ports mimic crashes.

Expert Tips for Configure Oracle Firewall

1. Use NSGs for granular control—tag instances “minecraft”. 2. Automate with Terraform for multi-server farms. 3. Monitor with OCI Logging: Filter port denies. 4. Rate-limit UFW: limit 10/s for 25565. 5. IPv6: Add ::/0 rules if enabled.

6. Proxies hide ports: Cloud proxy on secret UDP. 7. Free Tier: 2 VMs max—share rules. 8. Mods: Scan ports pre-deploy. 9. Backup rules: Export Security List JSON. 10. Latency: West regions for US, custom rules minimize hops.

Image: Configure Oracle Firewall for Minecraft Ports - UFW status showing Minecraft ports allowed. These elevate basic setups.

Conclusion – Secure Your Minecraft Server

Mastering how to configure Oracle Firewall for Minecraft Ports unlocks reliable Oracle Cloud hosting. Follow these 10 steps for Java, Bedrock, and mods without hitches. Combine with Java installs, optimizations, and Free Tier limits for a pro setup.

Your server now withstands player surges. Troubleshoot crashes? Ports first. Scale to modded worlds or low-latency VMs next. Secure, free Minecraft awaits on Oracle. Understanding Configure Oracle Firewall For Minecraft Ports is key to success in this area.

Share this article:
Marcus Chen
Written by

Marcus Chen

Senior Cloud Infrastructure Engineer & AI Systems Architect

10+ years of experience in GPU computing, AI deployment, and enterprise hosting. Former NVIDIA and AWS engineer. Stanford M.S. in Computer Science. I specialize in helping businesses deploy AI models like DeepSeek, LLaMA, and Stable Diffusion on optimized infrastructure.