This is iptables script to set a rate limit to http and h..
Category : Firewall
Creating a Proxy server to pass services from one IP to another using IPTables A simple script..
Request to add IP filter to allow office IP 175.143.69.21 a. Remote Desktop (port 19389) b. SQL Server remote connection (port 1433) =========================================================== 1. Windows Firewall managed by Kaspersky 2. To add IP Filter, go to taskbar click on Kaspersky Endpoint Security 3. Settings > Firewall > Network packet rules 4. Add > Allow > ..
In our infrastructure, we will be using Dells and Cisco switches as our Switch. Before we proceed to the commands, we must know how to login to the Switch within IPServerOne Standard. All Support Engineer must have the Jumphost access to access the switch. 1. Identify which switch that you would like to login to,by ..
Sometimes in event of ddos attack the firewall sessions can reach the maximum limit which might cause the intermittent access to the server. In order to clear the sessions please perform the steps below: 1. SSH to the firewall 2. Check on the current sessions: Remote Management Console ssg20-> ssg20-> get session alloc 7996/max 8064, ..
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts. /usr/local/directadmin/custombuild/options.conf modsecurity=yes modsecurity_ruleset=no Navigate to /usr/local/src folder ..
Ticket Example : UAE-322-42132 Findings from details provided in Ticket : – Customer have their own dedicated firewall (Cisco) Therefore we would want to perform the request in the dedicated firewall. Steps : 1 – Find the access to the firewall. (Can refer to Seniors) 2 – Run command “sh run” to show the ..
Ticket Example : HFR-787-99774 ModSecurity is an open-source web-based firewall application (or WAF) supported by different web servers: Apache, Nginx and IIS. Usage. The module is configured to protect web applications from various attacks. Below are the following steps you can try after you have ssh to the nameserver Enter the edit file vi /etc/httpd/conf/httpd.conf ..