When setting up infrastructure, getting your applications up and running will often be your primary concern. However, making your applications to function correctly without addressing the security needs of your infras...
7 days ago • By Justin Ellingwood, Alex GarnettSecurityFirewallConceptualNetworkingVPN
Hi all, I downloaded tomcat in ubuntu and MySQL database so tomcat runs successfully with my server IP address and the port, and when I want to deploy the war file of my application it gives me “ERR_CONNECTION_REFUSED”
1 answer • 12 days ago • By tselawe706APIDigitalOcean Cloud FirewallsFirewallInitial Server SetupUbuntu
In this guide, you will install and configure a Memcached server. You’ll also add authentication to secure Memcached using Simple Authentication and Security Layer (SASL). Finally, you’ll learn how to bind Memcached t...
1 month ago • By Jamon CamissoCachingFirewallInteractiveSecurityServer OptimizationUbuntuUbuntu 22.04
Are there plans to allow for better k8s firewall management? It looks like fw is auto-generated when k8s clusters are created. I’d like to create my own with its own rules and have them auto-assign (or manually-assign...
1 answer • 1 month ago • By EthanDigitalOcean Cloud FirewallsDigitalOcean Managed KubernetesFirewallKubernetes
Title describes the problem. I installed the console but it times out waiting for handshake. I have UFW (iptables) configured to only allow specific hosts access on port 22. Is there an IP range for DO I can add to ge...
1 answer • 2 months ago • By jhargisDigitalOcean DropletsFirewallInteractiveNetworkingSecurity
Hi, OS - UBUNTU 20.04 Problem: Recently our server and database (postgresql) being attacked by specific IP (45.155.204.146). The IP keep on trying to connect to our database and we believe subsequently cause our postg...
1 answer • 2 months ago • By CuteGreenBlueMantaRayFirewallPostgreSQL
I’m running Ubuntu 20.04 Server on my droplet along with Nginx. Should I install anti-virus software like ClamAV as in the following link? Is it essential or recommended? I’m also utilizing a fw and Cloudflare DNS pro...
Accepted Answer: Hello there, It is essential to secure your droplet, however running malware software is not definitely a must, but it is still a good thing to do. I’ll highly recommend checking our tutorial An Introduction to Securi...
3 answers • 2 months ago • By mpasqualiDigitalOcean DropletsFirewallUbuntu 20.04
NAT, or network address translation, is a general term for mangling packets in order to redirect them to an alternative address. Usually, this is used to allow traffic to transcend network boundaries. A host that impl...
Implementing a firewall is an important step in securing your server. In this guide, you’ll learn how to construct a firewall that can be the basis for more complex rule sets. This firewall will focus primarily on pro...
3 months ago • By Jeanelle Horcasitas, Justin EllingwoodFirewallUbuntuUbuntu 20.04
I installed plesk on ubuntu, my project works with port 3000 and other ports which needs to be enabled and also listens, but i am finding it difficult to find out how to really open it and get it to listen. Here is wh...
2 answers • 3 months ago • By Mac ArthurApacheDigitalOceanFirewallUbuntu
Can I explicit allow DigitalOcean console access via ssh without opening my droplet’s 22 to the entire internet? AKA does the console exist on the 10.x.x.x subnet or another entity I can whitelist.
2 answers • 3 months ago • By SmallNavyMorelConfiguration ManagementFirewallUbuntu 20.04
Hello everyone, my website is bietduoc.net currently selling to customers all over the world, but now the Indian market has many people entering SEO Spam, not real customers. So what if I want to temporarily block Ind...
2 answers • 3 months ago • By bietduocDigitalOcean Cloud FirewallsFirewall
I’ll be creating six Droplets (Debian) with both UFW and DO firewalls all to run a copy of a web service. I will also create one droplet to manage these servers. Can I set the firewalls for the servers to accept incom...
2 answers • 3 months ago • By bryangilbertDigitalOcean Cloud FirewallsFirewallNetworking
In this final tutorial in the series, you will create custom Kibana rules and generate alerts within Kibana’s SIEM dashboards. Once you have rules in place and understand where and how to filter Suricata’s logs using ...
3 months ago • By Jamon CamissoFirewallNetworkingSecuritySuricataUbuntu 20.04
Here is a screen grab of ‘grep “Failed password” /var/log/auth.log’for reference: https://imgur.com/a/G2bwrZO I have the port range 30999:59999 set to DENY IN from ANYWHERE for udp and tcp traffic, yet I’m still recei...
1 answer • 4 months ago • By AustinFirewallUbuntu 20.04
The previous tutorials in this series guided you through installing, configuring, and running Suricata as an Intrusion Detection (IDS) and Intrusion Prevention (IPS) system. You also learned about Suricata rules and h...
4 months ago • By Jamon CamissoRocky LinuxRocky Linux 8SecurityNetworkingFirewallElasticsearchSuricata