SecureAccess® CLOUD protects web applications from external threats and prevent unauthorized access using these additional security recommendations at firewall or server level.
To prevent unauthorized access from the Internet to your web applications we recommend you configure your server to accept only request from SecureAccess® CLOUD servers. This can be done at Firewall level or configuring the server itself. If you choose the second option, this are to examples you can use for the Linux and Windows servers.
In Linux servers you can add iptables rules to block incoming traffic from other IP addresses than SecureAccess® CLOUD: