{"id":3599,"date":"2025-09-12T18:00:35","date_gmt":"2025-09-12T15:00:35","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/"},"modified":"2025-09-12T18:00:35","modified_gmt":"2025-09-12T15:00:35","slug":"securing-your-linux-server-limiting-database-connections-to-whitelisted-ips","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/","title":{"rendered":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today\u2019s digital landscape, securing your Linux server is imperative to safeguarding sensitive data and maintaining the integrity of your applications. One effective strategy for enhancing your server&#8217;s security is limiting database connections to whitelisted IP addresses. This article will guide you through the steps to implement this important security measure.<\/p>\n<p><\/p>\n<h2>Understanding the Risks<\/h2>\n<p><\/p>\n<p>Databases are a treasure trove of sensitive information. Without proper security measures, they can be vulnerable to unauthorized access, attacks, and data breaches. Limiting access to only trusted IP addresses makes it significantly harder for malicious actors to exploit your database services.<\/p>\n<p><\/p>\n<h2>Why Whitelisting?<\/h2>\n<p><\/p>\n<p>Whitelisting IPs means that you create a list of trusted IP addresses that are allowed to connect to your database. This method helps:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Reduce Attack Surface:<\/strong> By allowing connections only from known IPs, you decrease the number of potential access points for attackers.<\/li>\n<p><\/p>\n<li><strong>Enhance Monitoring:<\/strong> It&#8217;s easier to track access logs and identify unauthorized attempts when only specific IPs are allowed.<\/li>\n<p><\/p>\n<li><strong>Improve Compliance:<\/strong> Many regulations require organizations to implement measures that protect sensitive data, and IP whitelisting can be part of your compliance strategy.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h2>Step-by-Step Guide to Whitelisting IPs<\/h2>\n<p><\/p>\n<h3>Step 1: Identify Trusted IPs<\/h3>\n<p><\/p>\n<p>The first step is to identify the IP addresses that need access to your database. This could be:<\/p>\n<p><\/p>\n<ul><\/p>\n<li>Your application server(s)<\/li>\n<p><\/p>\n<li>Developer machines (if needed)<\/li>\n<p><\/p>\n<li>Any other trusted sources<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>Step 2: Update Firewall Rules<\/h3>\n<p><\/p>\n<p>To limit access at the network level, update your firewall rules. Firewalls such as <code>iptables<\/code> or <code>ufw<\/code> can be utilized to implement whitelisting.<\/p>\n<p><\/p>\n<h4>Using <code>iptables<\/code><\/h4>\n<p><\/p>\n<p>bash<\/p>\n<p>iptables -A INPUT -p tcp -s <trusted_ip> &#8211;dport <db_port> -j ACCEPT<\/p>\n<p>iptables -A INPUT -p tcp &#8211;dport <db_port> -j DROP<\/p>\n<p>service iptables save<\/p>\n<p><\/p>\n<h4>Using <code>ufw<\/code><\/h4>\n<p><\/p>\n<p>bash<\/p>\n<p>ufw allow from <trusted_ip> to any port <db_port><\/p>\n<p>ufw deny <db_port><\/p>\n<p><\/p>\n<h3>Step 3: Configure Database User Permissions<\/h3>\n<p><\/p>\n<p>In addition to network-level security, you should also refine user permissions in your database. Ensure that each user has the least privileges necessary for their role.<\/p>\n<p><\/p>\n<p>For example, in MySQL you can create a user with specific IP access:<\/p>\n<p><\/p>\n<p>sql<br \/>\nCREATE USER &#8216;user&#8217;@&#8217;<trusted_ip>&#8216; IDENTIFIED BY &#8216;password&#8217;;<br \/>\nGRANT SELECT, INSERT ON database_name.* TO &#8216;user&#8217;@&#8217;<trusted_ip>&#8216;;<br \/>\nFLUSH PRIVILEGES;<\/p>\n<p><\/p>\n<h3>Step 4: Monitor Your Logs<\/h3>\n<p><\/p>\n<p>Keep an eye on your database and firewall logs for any unauthorized access attempts. Tools like <code>fail2ban<\/code> can help automate the process of banning IPs that show suspicious behavior.<\/p>\n<p><\/p>\n<h3>Step 5: Regularly Update Your Whitelist<\/h3>\n<p><\/p>\n<p>As your infrastructure grows and changes, so too will your trusted IP list. Regularly review and update your whitelist to ensure it accurately reflects your current environment.<\/p>\n<p><\/p>\n<h2>Additional Security Measures<\/h2>\n<p><\/p>\n<p>While IP whitelisting is an essential step in securing your database, it should be part of a broader security strategy that includes:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Using strong passwords<\/strong> and user authentication methods.<\/li>\n<p><\/p>\n<li><strong>Encrypting data<\/strong> both at rest and in transit.<\/li>\n<p><\/p>\n<li><strong>Implementing regular updates<\/strong> for your OS and applications.<\/li>\n<p><\/p>\n<li><strong>Backups<\/strong> for disaster recovery.<\/li>\n<p><\/p>\n<li><strong>Security tools<\/strong> for intrusion detection and monitoring.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Limiting database connections to whitelisted IPs is a simple but effective security measure that can significantly reduce the risk of unauthorized access to your sensitive data. By implementing this approach in tandem with other security best practices, you will create a stronger defense against potential threats.<\/p>\n<p><\/p>\n<p>Stay vigilant and proactive in your security efforts, and your Linux server can serve as a stronghold against the myriad of cyber threats present today. For further insights on securing your Linux environment or additional server management tips, stay tuned to the WafaTech Blog.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<p>By following these guidelines, you can enhance the security of your Linux server and protect invaluable data from unauthorized access.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital landscape, securing your Linux server is imperative to safeguarding sensitive data and maintaining the integrity of your applications. One effective strategy for enhancing your server&#8217;s security is limiting database connections to whitelisted IP addresses. This article will guide you through the steps to implement this important security measure. Understanding the Risks Databases [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3600,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[748,261,1756,1126,265,264,266,1755],"class_list":["post-3599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-connections","tag-database","tag-ips","tag-limiting","tag-linux","tag-securing","tag-server","tag-whitelisted","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs\" \/>\n<meta property=\"og:description\" content=\"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-12T15:00:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs\",\"datePublished\":\"2025-09-12T15:00:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/\"},\"wordCount\":588,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png\",\"keywords\":[\"Connections\",\"Database\",\"IPs\",\"Limiting\",\"Linux\",\"Securing\",\"Server\",\"Whitelisted\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/\",\"name\":\"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png\",\"datePublished\":\"2025-09-12T15:00:35+00:00\",\"description\":\"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server limiting database connections to whitelisted IPs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs - WafaTech Blogs","description":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/","og_locale":"en_US","og_type":"article","og_title":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs","og_description":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-09-12T15:00:35+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs","datePublished":"2025-09-12T15:00:35+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/"},"wordCount":588,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/09\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png","keywords":["Connections","Database","IPs","Limiting","Linux","Securing","Server","Whitelisted"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/","name":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/09\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png","datePublished":"2025-09-12T15:00:35+00:00","description":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/09\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/09\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png","width":1024,"height":1024,"caption":"linux server limiting database connections to whitelisted IPs"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-database-connections-to-whitelisted-ips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Your Linux Server: Limiting Database Connections to Whitelisted IPs"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/09\/Securing-Your-Linux-Server-Limiting-Database-Connections-to-Whitelisted-IPs.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/3599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=3599"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/3599\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/3600"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=3599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=3599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=3599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}