Additional security recomendations

SecureAccess® CLOUD protects web applications from external threats and prevent unauthorized access using these additional security recommendations at firewall or server level.

To prevent unauthorized access from the Internet to your web applications we recommend you configure your server to accept only request from SecureAccess® CLOUD servers. This can be done at Firewall level or configuring the server itself. If you choose the second option, this are to examples you can use for the Linux and Windows servers.

In Linux servers you can add iptables rules to block incoming traffic from other IP addresses than SecureAccess® CLOUD: 

iptables -I INPUT -p tcp -s {Wolf-Ray IP} --dport 80,443 -j ACCEPT iptables -I INPUT -p tcp -s 0.0.0.0/0 --dport 80,443 -j DROP

In Windows servers you can execute the following PowerShell commands to achieve the same results:

netsh advfirewall firewall add rule name="ALLOW_WOLFRAY" dir=in action=allow protocol=tcp localport=80,443 remoteip={Wolf-Ray IP} netsh advfirewall firewall add rule name="BLOCK_ALL_WOLFRAY" dir=in action=block protocol=tcp localport=80,443

To obtain the list of SecureAccess® CLOUD servers IP addresses contact our support team using the support form in your admin dashboard of sending an email to support@secureaccess.com. 

If you fail to implement these measures in your servers IP address is leaked your web applications will be exposed to external threats.

Last updated