{"id":2623,"date":"2025-06-01T20:24:05","date_gmt":"2025-06-01T17:24:05","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/"},"modified":"2025-06-01T20:24:05","modified_gmt":"2025-06-01T17:24:05","slug":"configuring-firewall-rules-for-optimal-linux-server-security","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/","title":{"rendered":"Configuring Firewall Rules for Optimal Linux Server Security"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today\u2019s interconnected world, securing servers is paramount for any organization that relies on digital infrastructure. One of the most fundamental ways to enhance your server&#8217;s security is through the configuration of firewall rules. In this article, we&#8217;ll delve into how you can effectively set up firewall rules on a Linux server to bolster your security posture.<\/p>\n<p><\/p>\n<h2>Understanding Firewalls<\/h2>\n<p><\/p>\n<p>A firewall acts as a barrier between your trusted internal network and untrusted external networks. It monitors and controls incoming and outgoing traffic based on predetermined security rules. On Linux systems, you typically use tools like <strong>iptables<\/strong>, <strong>firewalld<\/strong>, or <strong>ufw<\/strong> (Uncomplicated Firewall) to establish these rules.<\/p>\n<p><\/p>\n<h3>Types of Firewalls<\/h3>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Packet-filtering Firewalls<\/strong>: These are the most basic type; they inspect packets and determine whether to allow or block them based on predefined rules.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Stateful Firewalls<\/strong>: These track the state of active connections and make decisions based on the context of the traffic.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Application-level Firewalls<\/strong>: These operate at the application layer, offering protection against specific services like HTTP and HTTPS.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Tools for Firewall Configuration<\/h2>\n<p><\/p>\n<h3>1. <strong>iptables<\/strong><\/h3>\n<p><\/p>\n<p><code>iptables<\/code> is a command-line utility for configuring Linux kernel firewall. It&#8217;s powerful and flexible but can be complex for new users.<\/p>\n<p><\/p>\n<h3>Sample Configuration<\/h3>\n<p><\/p>\n<p>To allow SSH (port 22) and block all other ports, you can use the following basic commands:<\/p>\n<p><\/p>\n<p>bash<\/p>\n<p>sudo iptables -F<\/p>\n<p>sudo iptables -A INPUT -p tcp &#8211;dport 22 -j ACCEPT<\/p>\n<p>sudo iptables -A INPUT -m state &#8211;state ESTABLISHED,RELATED -j ACCEPT<\/p>\n<p>sudo iptables -A INPUT -j DROP<\/p>\n<p>sudo iptables-save | sudo tee \/etc\/iptables\/rules.v4<\/p>\n<p><\/p>\n<h3>2. <strong>firewalld<\/strong><\/h3>\n<p><\/p>\n<p><code>firewalld<\/code> is a dynamic firewall management tool that is easier to use than <code>iptables<\/code>, especially for managing zones and services.<\/p>\n<p><\/p>\n<h3>Sample Configuration<\/h3>\n<p><\/p>\n<p>To allow SSH and block all other traffic:<\/p>\n<p><\/p>\n<p>bash<\/p>\n<p>sudo systemctl start firewalld<br \/>\nsudo systemctl enable firewalld<\/p>\n<p>sudo firewall-cmd &#8211;permanent &#8211;add-service=ssh<\/p>\n<p>sudo firewall-cmd &#8211;set-target=DROP<\/p>\n<p>sudo firewall-cmd &#8211;reload<\/p>\n<p><\/p>\n<h3>3. <strong>ufw (Uncomplicated Firewall)<\/strong><\/h3>\n<p><\/p>\n<p><code>ufw<\/code> is designed to be an easy-to-use tool for managing a firewall on Ubuntu and Debian systems.<\/p>\n<p><\/p>\n<h3>Sample Configuration<\/h3>\n<p><\/p>\n<p>bash<\/p>\n<p>sudo ufw enable<\/p>\n<p>sudo ufw allow ssh<\/p>\n<p>sudo ufw default deny incoming<\/p>\n<p>sudo ufw default allow outgoing<\/p>\n<p><\/p>\n<h2>Best Practices for Firewall Configuration<\/h2>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Limit Open Ports<\/strong>: Only open the ports necessary for your applications and services. Always adhere to the principle of least privilege.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Use Strong Passwords<\/strong>: Make sure that services that require authentication use strong passwords and consider using key-based authentication for SSH.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Enable Logging<\/strong>: Log firewall actions to keep track of any suspicious activity.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Regularly Review Rules<\/strong>: Periodically review and update your firewall rules to adapt to changing security requirements and threats.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Implement Rate Limiting<\/strong>: Protect your server from brute-force attacks by limiting the rate at which connections are accepted.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Test Your Configuration<\/strong>: After implementing changes to your firewall configuration, use tools like <code>nmap<\/code> to ensure only the intended ports are open.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Configuring effective firewall rules is a critical aspect of securing a Linux server. By using tools such as <code>iptables<\/code>, <code>firewalld<\/code>, or <code>ufw<\/code>, you can tailor your firewall configurations to meet your specific security needs. Regular audits and adherence to best practices will further enhance the protection of your server against potential attacks. Remember, security is an ongoing process, not a one-time setup\u2014stay vigilant and keep your defenses strong.<\/p>\n<p><\/p>\n<p>For more insights and tips on Linux server security, keep following the WafaTech Blog!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s interconnected world, securing servers is paramount for any organization that relies on digital infrastructure. One of the most fundamental ways to enhance your server&#8217;s security is through the configuration of firewall rules. In this article, we&#8217;ll delve into how you can effectively set up firewall rules on a Linux server to bolster your [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2624,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[391,408,265,196,223,291,266],"class_list":["post-2623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-configuring","tag-firewall","tag-linux","tag-optimal","tag-rules","tag-security","tag-server","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Configuring Firewall Rules for Optimal Linux Server Security - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Configuring Firewall Rules for Optimal Linux Server Security %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuring Firewall Rules for Optimal Linux Server Security\" \/>\n<meta property=\"og:description\" content=\"Configuring Firewall Rules for Optimal Linux Server Security %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-01T17:24:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Configuring Firewall Rules for Optimal Linux Server Security\",\"datePublished\":\"2025-06-01T17:24:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/\"},\"wordCount\":547,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png\",\"keywords\":[\"Configuring\",\"Firewall\",\"Linux\",\"Optimal\",\"Rules\",\"Security\",\"Server\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/\",\"name\":\"Configuring Firewall Rules for Optimal Linux Server Security - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png\",\"datePublished\":\"2025-06-01T17:24:05+00:00\",\"description\":\"Configuring Firewall Rules for Optimal Linux Server Security %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server configuring secure network policies\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-firewall-rules-for-optimal-linux-server-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configuring Firewall Rules for Optimal Linux Server Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Configuring Firewall Rules for Optimal Linux Server Security - WafaTech Blogs","description":"Configuring Firewall Rules for Optimal Linux Server Security %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/","og_locale":"en_US","og_type":"article","og_title":"Configuring Firewall Rules for Optimal Linux Server Security","og_description":"Configuring Firewall Rules for Optimal Linux Server Security %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-06-01T17:24:05+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Configuring Firewall Rules for Optimal Linux Server Security","datePublished":"2025-06-01T17:24:05+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/"},"wordCount":547,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png","keywords":["Configuring","Firewall","Linux","Optimal","Rules","Security","Server"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/","name":"Configuring Firewall Rules for Optimal Linux Server Security - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png","datePublished":"2025-06-01T17:24:05+00:00","description":"Configuring Firewall Rules for Optimal Linux Server Security %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png","width":1024,"height":1024,"caption":"linux server configuring secure network policies"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-firewall-rules-for-optimal-linux-server-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Configuring Firewall Rules for Optimal Linux Server Security"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Configuring-Firewall-Rules-for-Optimal-Linux-Server-Security.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2623"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2623\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2624"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}