Cybersecurity: Project 2

Today, I successfully Configured Perimeter Firewall for Secure Web Server Deployment in the DMZ.

As the Security Analyst Administrator for a small corporate network, I recently deployed a web server within the demilitarized zone (DMZ) to enhance external-facing services while maintaining strong security controls. To ensure secure and efficient access, I configured the perimeter firewall on the pfSense network security appliance with the following rules:

  1. Create and configure a firewall rule to pass HTTP traffic from the WAN to the Web server in the DMZ.
  2. Create and configure a firewall rule to pass HTTPS traffic from the WAN to the Web server in the DMZ.

WAN to DMZ Access-firewall rules to permit inbound traffic from the WAN to the web server in the DMZ for both HTTP (port 80) and HTTPS (port 443) protocols. This configuration enables external users to access web services securely, with encrypted connections prioritized through HTTPS.

3. Create and configure a firewall rule to pass all traffic from the LAN network to the DMZ network.

LAN to DMZ Traffic-Created policies to allow unrestricted traffic from the LAN network to the DMZ. This ensures seamless communication between internal systems and the web server, supporting internal operations and maintenance activities.

The bottom line of this demo was that the DMZ (Demilitarized Zone) is a critical security layer that enables safe hosting of public-facing services by isolating them from the internal network.

Proper configuration of the perimeter firewall ensures controlled access, mitigates risks, and strengthens the overall security posture while maintaining seamless functionality.

Previous Post click here.

Stay tuned for the next project!

Written by Muhidin Warsame

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top