Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    5,000 firewall jobs found

    ...secure solutions) UPI, credit/debit cards, net banking PCI-compliant payment processing Inventory management Bulk ordering for clinics and distributors Coupon & discount system Wishlist Order tracking Customer dashboard Payment integration must be: Fully encrypted Secure Easy for users Reliable for domestic & international transactions E. Security & Compliance SSL implementation Firewall protection Anti-malware setup Secure database configuration Role-based admin access Automated backups Privacy & data protection compliance F. AI-Driven SEO & Visibility Optimization The platform must be built using the latest SEO standards: Structured schema markup for products Rich snippets optimization Core Web Vitals compliance Mobile-first design...

    $658 Average bid
    $658 Avg Bid
    16 bids

    ...invoicing records. • Route Indian payments through UPI and international cards through any reliable gateway you recommend, logging everything back to the billing module. • Pull all provisioning, suspend/unsuspend and cancellation actions through the Pterodactyl API so manual intervention is never required. • Apply best-practice security––SSL everywhere, safe credential storage, rate limiting, firewall rules on each node––and document what you did so I can maintain it. Deliverables 1. Responsive website and dashboard coded in vanilla HTML/CSS/JS, styled professionally. 2. Backend scripts or micro-service that bridges orders to the Pterodactyl API across the three OVH locations. 3. Integrated payment flow (UPI & cards) with ...

    $74 Average bid
    $74 Avg Bid
    18 bids
    Azure VM for Thick Client
    6 days left
    Verified

    I need a Microsoft Azure virtual machine (WIndows OS) to run a thick-client application with use...Azure virtual machine (WIndows OS) to run a thick-client application with users in two different regions. Deploy in such a way that multiple users (4 maximum) can simultaneously access remotely and also have ability to share screen.I’m open to your recommendation on the exact edition that best balances cost, licensing and stability for day-to-day use. Work involved - enable Defender, set basic firewall rules, use entraID (which is already configured with on-prem AD) -Configure secure Remote Desktop access with a non-default port and MFA where practical. - Optimise performance settings so the app launches quickly and the UI stays responsive over RDP, -Auto start and stop at ...

    $128 Average bid
    $128 Avg Bid
    27 bids

    Company: ValvesOnly Industry: Industrial Valves (B2B) Website: We are looking for an experienced WordPress developer to build and optimize a high-performance B2B e-comm...delivered high-speed WordPress projects. Technical SEO Requirements Proper URL structure Clean permalink setup Breadcrumb implementation XML sitemap configuration Schema markup (Product, Organization, FAQ) Proper canonical structure No duplicate URL/indexing issues Controlled indexing (no unnecessary archives, tags, media pages) RankMath compatibility Technical Expectations Secure setup (firewall, spam protection, clean backend) No bloated page builders Clean coding standards Hosting optimization recommendations Scalable architecture for future expansion Documentation provided at handover

    $269 Average bid
    $269 Avg Bid
    92 bids

    ...4-6 Ubuntu-based guests (mix of KVM VMs or LXC containers—whichever fits best per role). • Produce three reusable gold images: Web server template, Database server template, and Mail server template. Each must boot cleanly, auto-configure the network via DHCP or static values I supply, and be ready for apt updates. • Expose HTTP/HTTPS and SSH to the internet. You may rely on Proxmox built-in firewall, iptables/nftables, or an nginx/HAProxy reverse proxy—whichever you judge safest. All inbound rules should be documented. • Apply basic hardening: fail2ban, key-based SSH, and automatic security updates. • Hand over concise step-by-step notes so I can recreate a guest or template myself later. Acceptance criteria 1. I can browse to the sampl...

    $45 Average bid
    $45 Avg Bid
    15 bids

    ...documentation Queue & Messaging: • Dragonfly queue configuration guide • Worker scaling instructions • Failure recovery procedures Database: • Migration scripts • Backup & restore process • Indexing strategy documentation Monitoring & Observability: • Logging configuration • Alert setup guidance • Dashboard metrics explanation Security: • API authentication mechanism • Rate limiting configuration • Firewall and access rules summary Documentation: • Architecture diagram • API usage guide • Deployment runbook 3. Testing & Load Validation Clauses Freelancer must demonstrate system resilience under simulated production conditions. Functional Testing: • API validation against all doc...

    $293 Average bid
    $293 Avg Bid
    15 bids

    ...Install and update the latest stable Proxmox VE • Create 4–10 Linux VMs (Ubuntu preferred unless you suggest a better fit) with optimized CPU, RAM and storage allocations • Configure secure networking so each VM can reach the internet while remaining isolated from one another, and set up a reliable tunnel (WireGuard is ideal) for remote administration • Apply basic hardening: user roles, firewall rules, backups to an external target, and monitoring alerts • Provide concise documentation or a short call showing me how to add, clone, back up and restore VMs on my own All tasks should be completed using Proxmox’s native tools and standard best practices; no proprietary add-ons are required. Once everything is running smoothly I’ll verif...

    $9 / hr Average bid
    $9 / hr Avg Bid
    22 bids

    Hi, I’m looking for an experienced DevOps engineer to help me install and properly set up Meilisearch on my server. The task includes: • Installing Meilisearch on my Linux (Ubuntu) server • Configuring it to run as a service • Securing the setup (API keys, firewall rules, access restrictions) • Setting up HTTPS / reverse proxy (Nginx preferred) • Ensuring the server is optimized and production-ready • Basic guidance on how to manage and maintain it

    $29 Average bid
    $29 Avg Bid
    13 bids

    My site has suddenly stopped loading for visitors and now throws the browser error “ERR_CONNECTION_TIMED_OUT.” I have not made any code, setting, or content changes recently, yet the front-end is unreachable while I can still log in to the hosting control panel and WordPress/FTP. I need a troubleshooter who can: • Identify the root cause—whether it is DNS, firewall rules, server timeout, .htaccess, plugin conflict, or another server-level misconfiguration. • Apply the necessary fix so the website loads normally from all locations and devices. • Provide a concise summary of what was wrong and the steps taken so I can avoid a repeat. The job is complete when the home page and all sub-pages respond within normal load times without errors. A...

    $26 Average bid
    $26 Avg Bid
    80 bids

    Our live WooCommerce ...outlining what you inspected, what you found (even if that is “clean”), and the evidence behind each conclusion • immediate removal of any malicious files, database entries, or redirect rules you discover • confirmation that the “?srsltid=” parameter and any other unwanted redirects no longer appear under load testing • hardening measures applied and listed (permissions, wp-config tweaks, firewall rules, Cloudflare settings you recommend, etc.) • final validation that the site loads cleanly in major browsers with no warnings I will give you SSH and WordPress admin access as needed and can schedule a maintenance window if downtime is required. Please outline your estimated turnaround time and any precautions...

    $21 - $177
    Sealed
    $21 - $177
    30 bids

    I’m looking to partner with an experienced IT consulting team that can take ownership of my organisation’s core infrastructure. The immediate priorities are a clean network setup and reliable, ongoing server maintenance. Here’s what I need: • Assess our current topology, then design and implement an optimised network architecture (switches, routers, firewall, VLANs, redundancy, basic security hardening). • Review existing physical and virtual servers, carry out any required remediation, and establish a proactive maintenance schedule that keeps performance and uptime high. • Produce clear documentation and brief knowledge-transfer sessions so my in-house staff can follow day-to-day procedures. If your company has a proven track record in n...

    $246 Average bid
    $246 Avg Bid
    10 bids

    ...recently connected but not professionally configured. Need: SSL = Full (strict) Proper bypass rules for WooCommerce (cart/checkout/wp-admin) Remove unnecessary rate limits Clean WAF configuration No challenge loops 4-Security Stack Optimization Currently: Cloudflare Wordfence Hosting security Possible duplication / conflicts. Need: Decide optimal security architecture Avoid layered firewall conflicts Ensure no performance degradation 5-Performance Architecture Symptoms: Fast immediately after reset Slows down over time Log file grows Need: Confirm PHP 8.2 Proper caching strategy (Cloudflare + server) Check DB overhead Review wp_options autoload size Clean transients Remove unnecessary plugins 6-Plugin & Database Audit Need: Full plugin audit (co...

    $89 Average bid
    $89 Avg Bid
    58 bids

    ...External HTTPS Load Balancer fronting Cloud Run, with Cloud DNS records for and a managed SSL certificate. I already own the domain; you’ll handle certificate provisioning and validation. • Identity-Aware Proxy in front of the load balancer, locked down by an OAuth client and an email allowlist for password-protected access. • End-to-end Terraform: custom VPC, subnets, firewall rules, IAM (least privilege roles and service accounts), Cloud Run service, Cloud SQL instance, Serverless connector, Secret Manager bindings, Build triggers, LB/IAP/DNS, and monitoring/log-based alerts. • Ops collateral: a concise runbook outlining release flow, rollback, and common operational tasks. ACCEPTANCE CRITERIA 1. Pushing to the main branch of GitHub automaticall...

    $393 Average bid
    $393 Avg Bid
    39 bids

    ...documentation Queue & Messaging: • Dragonfly queue configuration guide • Worker scaling instructions • Failure recovery procedures Database: • Migration scripts • Backup & restore process • Indexing strategy documentation Monitoring & Observability: • Logging configuration • Alert setup guidance • Dashboard metrics explanation Security: • API authentication mechanism • Rate limiting configuration • Firewall and access rules summary Documentation: • Architecture diagram • API usage guide • Deployment runbook 3. Testing & Load Validation Clauses Freelancer must demonstrate system resilience under simulated production conditions. Functional Testing: • API validation against all doc...

    $345 Average bid
    $345 Avg Bid
    9 bids

    You are a senior cybersecurity + machine learning engineer. Build a practical, runnable, end-to-end Transformer-based Web Application Firewall (AI-WAF) prototype suitable for Smart India Hackathon / ISRO SIH demonstration. The system must implement the full pipeline: Log Ingestion → Parsing → Normalization → Tokenization → Transformer Training → Multi-Class Attack Classification → Anomaly Scoring → Real-Time Non-Blocking Inference → Alerting & Logging → Incremental Fine-Tuning ======================================== 1. CORE FUNCTIONAL REQUIREMENTS ======================================== A. Multi-Class Attack Detection The Transformer model must classify HTTP requests into: - BENIGN - SQL_INJECTION - XSS - COMMAND_INJECTION - ...

    $59 Average bid
    $59 Avg Bid
    8 bids

    ...already sign firmware; the server simply has to enforce signature checking before rollout. • fail2ban on the host should block any source IP after three bad login or certificate failures (SSH, Mosquitto, and Mender’s API). • Everything lives on the same VPS yet stays logically isolated—Docker or systemd-managed services are fine as long as configuration remains readable and easy to back up. • Firewall rules (UFW or iptables) expose only the essentials: 8883 for MQTT, 443 for Mender/HTTPS, and 22 for SSH. • I want clean deployment scripts or a single so I can rebuild the environment in minutes. Acceptance checks 1. A shell script or compose stack that fully provisions Mosquitto and Mender on a clean Ubuntu image. 2. Successful TLS publ...

    $122 Average bid
    $122 Avg Bid
    21 bids

    ...tested on my MacBook • API access enabled for future AI integration 4. DOCKER INFRASTRUCTURE • Docker Engine + Compose + Portainer • Clean project structure, isolated networks per service • Watchtower, health checks, log rotation • Well-commented Compose files, extensible for AI containers 5. NETWORKING & VPN • Tailscale mesh networking • WireGuard VPN (Dockerized) • Connect to my cloud server • Firewall hardening (Docker-aware) • Wake-on-LAN if supported 6. 5 DOMAINS • Dockerized reverse proxy (Nginx Proxy Manager/Traefik/Caddy) • Auto SSL, all 5 domains routed • Easy to extend for future AI endpoints 7. KALI LINUX • Kali metapackages on host + Kali Docker containers • No conflicts with production...

    $415 Average bid
    $415 Avg Bid
    45 bids

    ...is in the incident report I will share once we start). At the moment I have zero hardening in place—no firewall rules, no SSL, nothing—so the attacker clearly found an easy way in. I do have a recent full backup, so you can work safely and roll back if needed. Your mission is to identify the entry point, remove any malicious code or files, close the vulnerability, and leave the server in a state that convinces the host to lift the ban. You are welcome to use tools such as fail2ban, UFW/iptables, ClamAV, rkhunter, ModSecurity, or any other utilities you normally rely on. Deliverables • Clean, uncompromised web root and services reinstated • Detailed hardening steps applied (firewall, SSL/TLS, updated packages, secure SSH settings, etc.) &bull...

    $186 Average bid
    $186 Avg Bid
    26 bids

    I need Grafana and Prometheus installed and fully configured from scratch, then Prometheus (with the usual Node Exporter) deployed on my remote Linux server so it can scrape the host and forward data. Once data is flowing, I want a clean, responsive Grafana dashboard that shows at a glance: CPU load, memory usage, disk space, inbound/outbound network traffic and total server...data collection and target health in Prometheus • Grafana dashboard (modern layout, dark theme) visualising the five core metrics listed above • Document Full setup so If need to setup again or add other remote servers I can and add extra panels or data sources later Everything should be set up using best practices—systemd services, persistent storage paths, clear job labels, and minimal fi...

    $100 Average bid
    $100 Avg Bid
    55 bids

    ...need Cloudflare configured so my site automatically blocks malicious or nuisance traffic rather than legitimate visitors. The immediate headache is spam-driven form submissions and crawlers hammering the same pages hundreds of times a minute, so the goal is to stop those two behaviours without slowing genuine users. I already have a Cloudflare account in place; what I’m missing are the right firewall rules, bot management settings, and rate-limiting thresholds. You’ll review my current WAF/Bot Management setup, identify the loopholes that allow automated form posts and excessive page requests, then implement Cloudflare features such as Bot Fight Mode, custom WAF rules, Challenge or Turnstile for forms, and sensible request limits. Deliverables • Documented ...

    $418 Average bid
    $418 Avg Bid
    130 bids

    ...explained in plain English Requirements and experience You must have proven experience with most of the following: GoHighLevel API ServiceM8 API Webhooks, scheduled jobs, and robust integration patterns VPS deployment and basic DevOps Logging, monitoring, and alerting If you also have experience with Zapier, Make, or GoHighLevel workflows, include that in your proposal. Security requirements Firewall and SSH hardening Secrets management approach (no keys stored in plain text) Least privilege access where possible Costs and ongoing costs (must be included) Your proposal must clearly separate: A One off setup cost (fixed price) Includes server provisioning, middleware deployment, configuration, logging and monitoring setup, testing support, and documentation handover. B O...

    $87 Average bid
    $87 Avg Bid
    29 bids

    ...(Nginx is preferred, but Apache is acceptable). 2. Deployment: Upload the production build files to the server. 3. Configuration: Configure the web server to serve the static files and handle Client-Side Routing (ensure refreshing pages doesn't result in 404 errors). 4. Domain & SSL: Point my domain to the VPS and install a free SSL Certificate (Let's Encrypt/Certbot) for HTTPS. 5. Security: Basic firewall setup (UFW) to secure the server. Deliverables: • The website must be live, secure (HTTPS), and fully functional on my domain. • A brief document or text file explaining where the files are located on the server and the command to restart the web server if needed. Required Skills: • Linux System Administration (Ubuntu/Debian) • Web Server Con...

    $90 Average bid
    $90 Avg Bid
    64 bids

    We are seeking an experienced freelance developer (or small team) to build a cross-platform application using AWS Amplify that integrates a frontend interface with a backend AI system. The app will feature real-time network visualization, an LLM-powered...network traffic. Three traffic levels: low, medium, high, controlled by the backend and varying over time (these three levels is an input parameter by the backend). Visualization of cyber attacks using a red bug approaching devices, invoked by the backend. Backend-controlled variables for different cyber-attack flows, similar to traffic patterns (low, medium, high). Bugs must hit a blue shield/firewall symbol and disappear before reaching devices. Reference visualization example:

    $547 Average bid
    $547 Avg Bid
    185 bids

    Description I’m hiring an experienced Open Tibia developer to deploy a modern 13+/14.12 stack using Canary (OTBR) and deliver a complete working foundation: server + client + website accounts, with proper backups and rollback. This is an assets-based 13+/14+ project (not 8.6 / legacy). 1) Server (Ubuntu 22.04 VPS) Install/configure Canary (OTBR 14.12+) MariaDB setup Proper config + ports + firewall systemd services with auto-restart Confirm clean restarts and stability Start with a standard map base (I’ll move to a custom map later) 2) Client (Windows) Compile OTClient Redemption (Windows) Preconfigured connection (no IP editing) Basic branding (name/logo) Package as downloadable ZIP Auto-update setup for client files/modules/assets (versioned) 3) Website...

    $199 Average bid
    $199 Avg Bid
    69 bids

    ...retention/cleanup. Model routing (cheap / balanced / premium) + spend caps (daily/weekly/monthly). Integrations: OpenRouter + optional Syntx for cost-efficient content generation. Powerful models with minimal false refusals for legitimate business tasks. Security Infra/accounts/keys owned by me. Temporary developer access only; full revocation after handover. SSH keys only, baseline hardening (firewall/fail2ban), secure secret handling. Full delivery package: codebase, docker-compose, runbook, backup/restore, access map. Deliverables Working MVP + demo. Repo + deployment/update instructions. Security/operations documentation. 30/60/90-day improvement roadmap. Proposal Requirements Please send a non-template proposal with: your architecture (specifically for OpenCl...

    $469 Average bid
    $469 Avg Bid
    44 bids

    I’m looking for an online tutor based in India who can guide me through intermediate-level administration of both Linux and Windows Server environments. On the Linux side I want practical, session-based coaching in system administration, security and firewall management, and shell scripting. For Windows Server, the focus should be Active Directory management, server configuration and deployment, plus security and patch management. Each topic needs to be demonstrated live, with time for me to replicate the steps on my own lab machines during or immediately after the call. We can meet on Zoom or Google Meet for 2–3 hours a week, preferably evenings or weekends. Deliverables • A structured lesson plan that maps out the sequence of sessions • Recordings ...

    $2 / hr Average bid
    $2 / hr Avg Bid
    6 bids

    ...sysctl tweaks, AppArmor (or comparable MAC), DNS proxy with encrypted queries, and a firewall configured to best practice levels. I did not select a specific firewall in the form, so feel free to recommend whether UFW, iptables or firewalld is the right fit for an always-on laptop that roams between trusted and untrusted networks. Deliverables I will sign off on: • Debian (stable or testing – your call with rationale) installed and fully updated • Libreboot or equivalent coreboot/firmware hardening applied, with clear notes if any T480 limitations arise • Firefox and Brave installed and hardened (add-ons, about:config, Brave Shields settings documented) • Encrypted DNS proxy running system-wide • Firewall ruleset active on all...

    $380 Average bid
    $380 Avg Bid
    30 bids

    I’m seeing legitimate human visitors locked out of my blog articles because some of my current Cloudflare firewall rules are too aggressive. While the bad-bot and scraper filters must remain in force, I need every other rule reviewed, trimmed, or rewritten so only real threats are challenged or blocked. Here’s what I need from you: • Audit all existing Cloudflare WAF, custom firewall, rate-limiting, and bot-management rules. • Identify why human traffic is getting blocked, especially on blog article URLs. • Propose and implement precise rule adjustments or new rules that restore access for real users without weakening security. • Preserve—or improve—protections that block or challenge excluded/bad bots responsible for high se...

    $37 Average bid
    $37 Avg Bid
    11 bids

    ...Could not connect to server Status: Waiting to retry... Credentials are correct, so the problem is likely buried in network settings, passive vs. active mode, firewall or port-forwarding issues. I cant find the solution for two days it drives me crazy. I need someone with clear, hands-on FTP troubleshooting experience to pinpoint the cause, walk me through the adjustment, and leave me with a repeatable fix. Deliverables 1. Live or recorded demonstration that FileZilla successfully connects and lists the remote directories. 2. Short, step-by-step summary of the exact changes made (ports opened, mode switched, firewall rules, etc.). Acceptance criteria: FileZilla connects within the normal timeout window, shows the remote file list, and I can upload a small ...

    $55 / hr Average bid
    Urgent
    $55 / hr Avg Bid
    9 bids

    I’m looking to embed an AI-powered tutor directly into our internal web portal so...cases showing the bot guiding a student through a sample math and language-arts problem Acceptance criteria – Answers are age-appropriate, step-by-step, and never reveal full solutions on first request – Profanity, personal data, and unsafe content are blocked or redacted – Average response time < 3 s in staging with 20 concurrent users – Code passes our security scan and runs behind our firewall with no external callbacks other than the model API If you’ve built educational chatbots before—especially ones that sit inside a corporate portal—I’d love to see a quick example. Let me know how you would tackle prompt design, moderation, an...

    $859 Average bid
    NDA
    $859 Avg Bid
    120 bids

    We need an expert Odoo + DevOps engineer to migrate our existing Odoo 18 environment from to a Quebec-based private cloud. This project involves strict compliance, hardened security, and zero-data-loss migration. What You’ll Do Provision production & staging servers in Quebec Harden Ubuntu (firewall, Fail2ban, SSH, auto security updates) Deploy Odoo 18 Enterprise with Nginx, SSL/TLS, secure headers Configure PostgreSQL (encryption, tuning) Migrate database, filestore, and ~13 modules from Ensure full functionality across Accounting, CRM, HR, Sales, Inventory, Website, Manufacturing, etc. Implement encrypted daily backups (30-day retention) Provide DR and technical documentation Support testing and final production cutover Experience working in environments aligned wit...

    $574 Average bid
    $574 Avg Bid
    26 bids

    ...plugin or a guided script that I can install for you). What I expect • Identify every malicious file or database entry • Eliminate the malware and close whatever vulnerability let it in • Submit the reconsideration request to Google and confirm the warning disappears • Supply a brief post-clean report outlining what was found, what was fixed, and any hardening steps I should keep in place (firewall, auto-updates, etc.) Acceptance criteria • Site loads normally with no Safe Browsing or similar security alerts • Admin area functions without injected redirects or code • Your final report lists the cleaned items and recommended ongoing security measures If additional temporary dashboard-level access or plugin installs are required, ...

    $19 Average bid
    $19 Avg Bid
    25 bids

    ...IP allowlisting with proper access controls • Zero-trust network access implementation • Deliverable: Secure access solution with documented procedures 6. Open Ports Security Audit • Task Type: Network security assessment and hardening • Requirement: Review and secure network port exposure • Process: • Comprehensive port scan and service audit • Close unnecessary open ports • Implement proper firewall rules and security group configurations • Document justified open ports with security rationale Required Qualifications Essential Experience: • in web application security and DevOps/infrastructure security • Proven track record with penetration testing remediation projects • Strong understanding of OWASP security principle...

    $280 Average bid
    $280 Avg Bid
    25 bids

    ...IP allowlisting with proper access controls • Zero-trust network access implementation • Deliverable: Secure access solution with documented procedures 6. Open Ports Security Audit • Task Type: Network security assessment and hardening • Requirement: Review and secure network port exposure • Process: • Comprehensive port scan and service audit • Close unnecessary open ports • Implement proper firewall rules and security group configurations • Document justified open ports with security rationale Required Qualifications Essential Experience: • in web application security and DevOps/infrastructure security • Proven track record with penetration testing remediation projects • Strong understanding of OWASP security principle...

    $93 Average bid
    $93 Avg Bid
    12 bids

    ...long as the result is stable, efficient, and well documented. Once everything is set up, my ASIC miners should be able to connect via Stratum and begin hashing without issues. The pool must fully support SHA-256 mining in both solo and merged modes and expose a standard Stratum interface compatible with common ASIC miners. DDoS protection should be built directly into the setup, whether through firewall rules, reverse proxies, rate limiting, or another proven method you prefer. The project should also include a clean and simple web dashboard that displays worker statistics, pool hashrate, and payout history. An automatic payout system is required, with configurable payout thresholds. All configuration files should be clearly structured and well commented so I can easily make fut...

    $21 / hr Average bid
    $21 / hr Avg Bid
    126 bids

    My WordPress install has been breached. I am s...every spam post, page, and injected malicious link without harming legitimate content. • Audit and remove any backdoors, rogue users, or altered core, theme, and plugin files. • Restore secure admin access, forcing password resets and re-generating salts. • Patch WordPress, themes, and plugins to the latest stable versions and harden the installation (file permissions, disallowed editing, firewall rules, etc.). • Provide a brief hand-off report summarising what was found, what was fixed, and concrete steps I should follow to prevent a repeat. Please outline your estimated turnaround time and any security tools or scanners you prefer (e.g., WP-CLI, Wordfence, Sucuri, MalCare). I can supply cPanel and databa...

    $133 Average bid
    $133 Avg Bid
    62 bids

    ...documentation so I can recreate or scale the setup later. Acceptance Criteria 1. I can import or run the client configuration on Windows and macOS desktops, plus their mobile/tablet counterparts, and immediately reach internal resources. 2. DNS leaks are prevented, traffic is fully tunneled, and basic speed tests show performance in line with the chosen server capacity. 3. All admin commands and firewall rules are documented in a README or similar file delivered with the project. Once delivered and verified, you hand off any keys or credentials, and I’ll close the project....

    $89 Average bid
    $89 Avg Bid
    15 bids

    ...purchased two UniFi UDM Pro, and I want them linked so that staff can reach internal resources from either location as if they were on the same LAN or to work remotely (VPN access). Nothing is in place yet, so the full security stack must be designed and deployed from scratch. Scope of work • Build and test a site-to-site VPN between the two UDM Pros for seamless remote access. • Create granular firewall rules that allow only the traffic we specify while blocking everything else. • Enable and tune UniFi’s intrusion-detection/prevention features to catch unwanted activity without flooding us with false alarms. • Document every setting—screenshots or exported configs—so I can replicate or restore the setup if needed. • Walk me t...

    $433 Average bid
    $433 Avg Bid
    40 bids

    Project Description: We are seeking an experienced Network Engineer with specific expertise in the Ubiquiti UniFi ecosystem to help us migrate our user authentication and access control from a traditional Active Directory (AD) environment to UniFi Identity (Standard or Enterprise). The primary goal is to centralize user management directly within the UniFi firewall/console, allowing us to decommission our Windows-based Active Directory while maintaining secure, role-based access to our network resources. Scope of Work: UniFi Identity Setup: Configure UniFi Identity (UID) on our UniFi Cloud Gateway. User Migration/Creation: Assist in migrating existing users or setting up a new user directory within UniFi Identity. Authentication Replacement: Set up One-Click WiFi (Radius-less or ...

    $6 / hr Average bid
    $6 / hr Avg Bid
    3 bids

    My network edge relies on a Sophos XG appliance and a Fortinet FortiGate unit. Both devices are in production, but their current configuration is a mix of legacy rules and quick fixes that now interfere with performance and security. I want a seasoned firewall engineer to step in, examine every setting, correct what is wrong, and design a clean, least-privilege rule base. Scope of work • Configuration – back up the existing setups, remove or refine redundant rules, and align all interfaces, NAT, VPN, IPS and logging options with best-practice guidelines for Sophos SFOS and FortiOS. • Troubleshooting – identify and eliminate the intermittent drops we see on site-to-site VPN and outbound web traffic. Validation must include live traffic tests and log review....

    $167 Average bid
    $167 Avg Bid
    19 bids

    ...and processing whitelist updates for partners and applications that need special access. If a routing, DNS, or firewall anomaly pops up, I’ll look to you to trace it, fix it, and note the change so we don’t chase the same ghost twice. Deliverables • Fully configured, healthy Veeam backup jobs with a short test-restore report • A concise runbook covering backup schedules, retention, and recovery steps • Resolution of current and future network issues, each closed with a brief cause-and-fix note • Ongoing whitelist management documented in a shared change log Familiarity with Windows Server 2019 administration tools, Veeam Backup & Replication, and core networking (firewall rules, VLANs, DNS) is essential. If that’s squarel...

    $244 Average bid
    $244 Avg Bid
    49 bids

    ...knocks the site offline. I have already: • Placed the site on Cloudflare, • Allowed full, captcha-free access for visitors inside Canada, • Forced most other countries through a captcha, • Experimented with firewall rules, IP and UA blocking. Unfortunately, Google’s crawler activity drops whenever the shield becomes too strict, so I’m looking for an expert who can strike the sweet spot: block malicious, spam and scraper bots without hindering search-engine or legitimate users. What I expect from you • Audit my current Cloudflare setup (WAF, Bot Management, Firewall Rule sets, Rate Limiting, ASN / Country policies). • Create or fine-tune rules that: – keep Canadian users friction-free, – let Go...

    $103 Average bid
    $103 Avg Bid
    59 bids

    ...the most suitable virtualization platform (Parallels Desktop, VMware Fusion, VirtualBox, or another option) and justify the pick in terms of performance, native-chip support and ease of maintenance. • Install and configure the VM, including guest additions, shared folders, clipboard sync and network access so it feels seamless within macOS. • Apply all system updates, set up basic security (firewall, automatic updates) and enable hardware acceleration where possible. • Provide a concise, step-by-step hand-over document so I can replicate or adjust the setup later. Acceptance criteria: the VM must boot to a Mint desktop without errors, access the internet, share files with macOS and run everyday apps smoothly. If you’ve already navigated Apple Silicon ...

    $189 Average bid
    $189 Avg Bid
    28 bids

    My Panasonic Ns500 PBX sits on but cannot “see” the rest of my network. Everything else flows through a FortiGate 60F firewall, a FortiSwitch 424E-Fiber core, and a FortiSwitch 124F-FPOE at the edge. I need someone to shape the network so this Panasonic box can handle VoIP communication smoothly. What I already know • The PBX will run pure SIP. • Dedicated VoIP rules on the FortiGate are required; simple, generic access is not enough. What I need from you • Review the current FortiGate policy set, VLAN layout, and switch port profiles. • Create or adjust firewall rules, NAT, and any SIP ALG or helper settings so that SIP registration, signalling, and RTP streams pass without one-way audio or dropped calls. • Tag or untag the a...

    $467 Average bid
    $467 Avg Bid
    21 bids

    ...untouched; the only operation was plugging in and initializing that additional disk. I need a Windows Server specialist who can securely remote in, diagnose what I overlooked, and bring both the RDP service and the missing drive back online. Typical areas to inspect could be disk initialization/partitioning, drive letter assignments, storage pool or RAID configuration, as well as RDP-related firewall rules, NLA settings, and service dependencies—whatever is necessary to restore normal operation. Deliverables (must-haves) • Working Remote Desktop connection, tested from an external client. • Newly added drive fully mounted and accessible in File Explorer. • Brief summary of the root cause and the exact steps you took so I can document them for future ref...

    $153 Average bid
    $153 Avg Bid
    22 bids

    ...packets coming from the MikroTik peer. • Add or adjust the required route / policy rule so traffic flows symmetrically. • Validate success with bidirectional ping, traceroute and a quick real-world service test. Environment details • MikroTik RouterOS v7, WireGuard interface already configured and working one-way. • Ubuntu VPS (recent LTS) running the other WireGuard peer. • No unusual firewall rules are in place; the focus is purely on routing. How we’ll work I can provide current WireGuard configs, `ip route` and `ip rule` outputs, plus temporary SSH access to the VPS and WinBox/WebFig access to the MikroTik. A short screenshare or command-line session is fine—this should be a fast fix for someone who has dealt with asymmetric ...

    $42 Average bid
    $42 Avg Bid
    7 bids

    ...secure state. Scope of work • Track down and remove any malicious files, scripts, cron jobs, or database injections causing the redirects. • Restore full access to phpMyAdmin and the CyberPanel File Manager. • Repair or replace corrupted MySQL tables so every site loads correctly. • Patch WordPress core, themes, and plugins; tighten CyberPanel and LiteSpeed security settings; configure a firewall (e.g., CSF or equivalent) and fail2ban or similar brute-force protection. • Provide a short report of what you removed/changed plus a checklist of hardening steps for future prevention. Environment – VPS running CyberPanel (OpenLiteSpeed) – Multiple WordPress installs (ssh and root access available) Timeline I need the server back...

    $149 Average bid
    $149 Avg Bid
    130 bids

    ...application is already functional, and I have real clients. Now I need an experienced DevOps engineer to prepare a proper production-ready infrastructure. Scope of Work: I need help with: 1. Setting up Production Environment (secure & scalable) 2. Creating Staging / Testing environment 3. Implementing CI/CD pipeline 4. Server deployment (Docker preferred) 5. Security best practices (SSL, firewall, access control, secrets management) 6. Logging & Monitoring setup (error tracking, server logs, alerts) 7. Performance optimization basics 8. Documentation of the setup Requirements: • Strong experience in DevOps • Experience with Docker & containerization • Experience with cloud providers (AWS / Azure / GCP / DigitalOcean) • Experience wit...

    $195 Average bid
    $195 Avg Bid
    64 bids

    ...correct gblicense v15 binaries, deploy them to the server, and wire them up to the current Laravel stack. • Configure Nginx as the single entry point, including HTTPS termination (certbot is already available) and clean routing so that gblicense runs on its intended port while remaining invisible to the end user. • Optimise basic network security inside the app and proxy layers (a separate firewall is not planned). • Troubleshoot any build, dependency, or permission issues until the service is stable—no 502/504 or TLS errors in the logs. Deliverable & timing A fully operational gblicense v15 instance reachable at my domain over HTTPS, all licence-management functions working, and zero critical errors in the first 24 hours of uptime. The job mus...

    $163 Average bid
    $163 Avg Bid
    32 bids

    I have a production-ready build that now needs to go live on our Google Cloud environment, specifically on Compute Engine. The artifact is finished; what I’m missing is the DevOps expertise to turn that artifact into a resilient, repeatable deployment. Here’s what I need from you: • Provision and configure the necessary Compute Engine instance(s) • Harden the VM with the right firewall rules, service accounts, and startup scripts • Automate the deployment so it can be reproduced in one command (Terraform, Deployment Manager, or a shell script—your call) • Ensure the application starts on reboot and is reachable via HTTPS • Provide a concise hand-over document or README that explains each step and shows how to roll out future versio...

    $138 Average bid
    $138 Avg Bid
    29 bids

    Top firewall Community Articles