<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://serverrental.store/index.php?action=history&amp;feed=atom&amp;title=Firewalls</id>
	<title>Firewalls - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://serverrental.store/index.php?action=history&amp;feed=atom&amp;title=Firewalls"/>
	<link rel="alternate" type="text/html" href="https://serverrental.store/index.php?title=Firewalls&amp;action=history"/>
	<updated>2026-04-15T01:17:46Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://serverrental.store/index.php?title=Firewalls&amp;diff=1573&amp;oldid=prev</id>
		<title>Admin: Automated server configuration article</title>
		<link rel="alternate" type="text/html" href="https://serverrental.store/index.php?title=Firewalls&amp;diff=1573&amp;oldid=prev"/>
		<updated>2025-04-15T11:27:45Z</updated>

		<summary type="html">&lt;p&gt;Automated server configuration article&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;# Firewalls&lt;br /&gt;
&lt;br /&gt;
This article details firewall configuration for a MediaWiki 1.40 installation. Protecting your MediaWiki server with a properly configured firewall is crucial for security. This guide will cover common firewall concepts and specific considerations for MediaWiki.&lt;br /&gt;
&lt;br /&gt;
== What is a Firewall? ==&lt;br /&gt;
&lt;br /&gt;
A firewall acts as a barrier between your server and the outside world, controlling network traffic based on pre-defined rules. It examines incoming and outgoing network packets and either allows or blocks them based on these rules. Firewalls can be hardware-based, software-based, or a combination of both.  For most MediaWiki installations, software firewalls like `iptables` (Linux) or the Windows Firewall are sufficient. Understanding [[Network Security]] is vital when configuring a firewall. &lt;br /&gt;
&lt;br /&gt;
== Types of Firewalls ==&lt;br /&gt;
&lt;br /&gt;
There are several types of firewalls, each with its own strengths and weaknesses:&lt;br /&gt;
&lt;br /&gt;
* '''Packet Filtering Firewall:''' Examines individual packets and allows or blocks them based on source and destination IP addresses, ports, and protocols. This is the most basic type.&lt;br /&gt;
* '''Stateful Inspection Firewall:''' Keeps track of the state of network connections and allows packets based on whether they are part of an established connection. This is more secure than packet filtering. &lt;br /&gt;
* '''Proxy Firewall:''' Acts as an intermediary between your server and the outside world, hiding your server's IP address.&lt;br /&gt;
* '''Next-Generation Firewall (NGFW):''' Combines features of traditional firewalls with advanced features like intrusion prevention and application control.&lt;br /&gt;
&lt;br /&gt;
== Common Firewall Configurations for MediaWiki ==&lt;br /&gt;
&lt;br /&gt;
The following ports are commonly required for a functioning MediaWiki installation.  These should be opened in your firewall:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Port&lt;br /&gt;
! Protocol&lt;br /&gt;
! Description&lt;br /&gt;
|-&lt;br /&gt;
| 80&lt;br /&gt;
| TCP&lt;br /&gt;
| HTTP (Standard web traffic - unencrypted)&lt;br /&gt;
|-&lt;br /&gt;
| 443&lt;br /&gt;
| TCP&lt;br /&gt;
| HTTPS (Secure web traffic - encrypted) - Highly recommended! See [[HTTPS Configuration]]&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| TCP&lt;br /&gt;
| SSH (Secure Shell) - For remote administration. Restrict access to trusted IPs!&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TCP&lt;br /&gt;
| SMTP (Simple Mail Transfer Protocol) - For sending email notifications. If using an external SMTP server, this might not be needed.  See [[Email Configuration]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
It’s important to note that opening ports can increase your server’s attack surface. Only open the ports necessary for your MediaWiki installation to function.&lt;br /&gt;
&lt;br /&gt;
== Example Firewall Rules (iptables - Linux) ==&lt;br /&gt;
&lt;br /&gt;
The following are example `iptables` rules.  These should be adapted to your specific network configuration. *Always test your firewall rules carefully to avoid locking yourself out of your server!*  See [[Linux Server Administration]] for more information.&lt;br /&gt;
&lt;br /&gt;
```&lt;br /&gt;
# Allow incoming HTTP traffic&lt;br /&gt;
iptables -A INPUT -p tcp --dport 80 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
# Allow incoming HTTPS traffic&lt;br /&gt;
iptables -A INPUT -p tcp --dport 443 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
# Allow incoming SSH traffic from trusted IP address (replace with your IP)&lt;br /&gt;
iptables -A INPUT -p tcp --dport 22 -s 192.168.1.100 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
# Allow outgoing traffic&lt;br /&gt;
iptables -A OUTPUT -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
# Drop all other incoming traffic&lt;br /&gt;
iptables -A INPUT -j DROP&lt;br /&gt;
```&lt;br /&gt;
&lt;br /&gt;
These rules are a very basic example. More advanced configurations may be necessary depending on your security requirements.  Consider using a firewall management tool like `ufw` to simplify configuration.  See [[Server Security]] for further details.&lt;br /&gt;
&lt;br /&gt;
== Windows Firewall Configuration ==&lt;br /&gt;
&lt;br /&gt;
The Windows Firewall can be configured through the Windows Firewall with Advanced Security interface.  You will need to create inbound rules to allow traffic on ports 80, 443, and 22 (if needed).  Ensure the rules specify TCP as the protocol.  Refer to the official [[Microsoft Windows Server Documentation]] for detailed instructions.&lt;br /&gt;
&lt;br /&gt;
== Advanced Firewall Considerations ==&lt;br /&gt;
&lt;br /&gt;
* '''Rate Limiting:'''  Implement rate limiting to prevent denial-of-service (DoS) attacks.  &lt;br /&gt;
* '''Intrusion Detection/Prevention Systems (IDS/IPS):''' Consider using an IDS/IPS to detect and block malicious traffic.  See [[Intrusion Detection Systems]].&lt;br /&gt;
* '''Web Application Firewall (WAF):''' A WAF can protect your MediaWiki installation from web-based attacks like SQL injection and cross-site scripting (XSS).&lt;br /&gt;
* '''Regular Audits:''' Regularly audit your firewall rules to ensure they are still appropriate and effective.  See [[Security Audits]].&lt;br /&gt;
&lt;br /&gt;
== Firewall Rule Table Example - Specific Applications ==&lt;br /&gt;
&lt;br /&gt;
The following table outlines rules for specific applications that might interact with your MediaWiki server.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Application&lt;br /&gt;
! Port&lt;br /&gt;
! Protocol&lt;br /&gt;
! Description&lt;br /&gt;
|-&lt;br /&gt;
| phpMyAdmin&lt;br /&gt;
| 8080&lt;br /&gt;
| TCP&lt;br /&gt;
| Access to phpMyAdmin for database management.  Restrict access! See [[Database Administration]].&lt;br /&gt;
|-&lt;br /&gt;
| Redis (Cache)&lt;br /&gt;
| 6379&lt;br /&gt;
| TCP&lt;br /&gt;
| Access to Redis cache server. Only allow access from the MediaWiki server. See [[Caching]].&lt;br /&gt;
|-&lt;br /&gt;
| Memcached (Cache)&lt;br /&gt;
| 11211&lt;br /&gt;
| TCP&lt;br /&gt;
| Access to Memcached cache server. Only allow access from the MediaWiki server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Firewall and Load Balancers ==&lt;br /&gt;
&lt;br /&gt;
If you are using a load balancer in front of your MediaWiki servers, the firewall configuration becomes more complex. The firewall should typically be placed in front of the load balancer to protect the entire infrastructure.  The load balancer then distributes traffic to the backend MediaWiki servers.  Consult the documentation for your specific load balancer and firewall for detailed configuration instructions.  See [[Load Balancing]].&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
* [[Iptables Documentation]]: Official documentation for iptables.&lt;br /&gt;
* [[Windows Firewall Documentation]]: Official documentation for the Windows Firewall.&lt;br /&gt;
* [[Server Hardening]]: General server security practices.&lt;br /&gt;
&lt;br /&gt;
[[Category:Server Hardware]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Intel-Based Server Configurations ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Configuration&lt;br /&gt;
! Specifications&lt;br /&gt;
! Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i7-6700K/7700 Server]]&lt;br /&gt;
| 64 GB DDR4, NVMe SSD 2 x 512 GB&lt;br /&gt;
| CPU Benchmark: 8046&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i7-8700 Server]]&lt;br /&gt;
| 64 GB DDR4, NVMe SSD 2x1 TB&lt;br /&gt;
| CPU Benchmark: 13124&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i9-9900K Server]]&lt;br /&gt;
| 128 GB DDR4, NVMe SSD 2 x 1 TB&lt;br /&gt;
| CPU Benchmark: 49969&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i9-13900 Server (64GB)]]&lt;br /&gt;
| 64 GB RAM, 2x2 TB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i9-13900 Server (128GB)]]&lt;br /&gt;
| 128 GB RAM, 2x2 TB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i5-13500 Server (64GB)]]&lt;br /&gt;
| 64 GB RAM, 2x500 GB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i5-13500 Server (128GB)]]&lt;br /&gt;
| 128 GB RAM, 2x500 GB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i5-13500 Workstation]]&lt;br /&gt;
| 64 GB DDR5 RAM, 2 NVMe SSD, NVIDIA RTX 4000&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== AMD-Based Server Configurations ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Configuration&lt;br /&gt;
! Specifications&lt;br /&gt;
! Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 5 3600 Server]]&lt;br /&gt;
| 64 GB RAM, 2x480 GB NVMe&lt;br /&gt;
| CPU Benchmark: 17849&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 7 7700 Server]]&lt;br /&gt;
| 64 GB DDR5 RAM, 2x1 TB NVMe&lt;br /&gt;
| CPU Benchmark: 35224&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 9 5950X Server]]&lt;br /&gt;
| 128 GB RAM, 2x4 TB NVMe&lt;br /&gt;
| CPU Benchmark: 46045&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 9 7950X Server]]&lt;br /&gt;
| 128 GB DDR5 ECC, 2x2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 63561&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (128GB/1TB)]]&lt;br /&gt;
| 128 GB RAM, 1 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (128GB/2TB)]]&lt;br /&gt;
| 128 GB RAM, 2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (128GB/4TB)]]&lt;br /&gt;
| 128 GB RAM, 2x2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (256GB/1TB)]]&lt;br /&gt;
| 256 GB RAM, 1 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (256GB/4TB)]]&lt;br /&gt;
| 256 GB RAM, 2x2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 9454P Server]]&lt;br /&gt;
| 256 GB RAM, 2x2 TB NVMe&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Order Your Dedicated Server ==&lt;br /&gt;
[https://powervps.net/?from=32 Configure and order] your ideal server configuration&lt;br /&gt;
&lt;br /&gt;
=== Need Assistance? ===&lt;br /&gt;
* Telegram: [https://t.me/powervps @powervps Servers at a discounted price]&lt;br /&gt;
&lt;br /&gt;
⚠️ *Note: All benchmark scores are approximate and may vary based on configuration. Server availability subject to stock.* ⚠️&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
	</entry>
</feed>