A robust firewall is a cornerstone of network security. I built and configured a Linux-based firewall using IPTables to protect a network from unauthorized access while maintaining legitimate traffic flow.
Client :Michael Rodriguez
Project Type :Cyber Security
Duration :1 Week
Completion :09 June 2022
Client’s Problem
A small business faced repeated unauthorized login attempts on their Linux server. They lacked the expertise to block these attempts and wanted a cost-effective solution to enhance their security.
Our Strategies
Implemented a rule-based firewall to block unauthorized access while allowing essential services.
Designed the solution to be lightweight and easy to manage without third-party software.
Conducted tests to ensure the firewall was working as intended under simulated attack scenarios.
Our approach
Rule Creation: Configured IPTables rules to allow SSH traffic only from trusted IPs and block all others.
Testing: Conducted penetration tests, including brute force and port scans, to evaluate the firewall’s effectiveness.
Optimization: Monitored logs to identify any false positives and fine-tuned rules for better performance.
Documentation: Provided the client with a detailed guide for future modifications.
Results
The firewall successfully blocked 95% of unauthorized login attempts. The client reported improved server uptime and peace of mind, as they no longer had to worry about brute force attacks or port scans.