CN Report
CN Report
filtering
A CAPSTONE PROJECT REPORT
SIMATS ENGINEERING
Saveetha Institute of Medical and Technical Sciences
Chennai-602105
July 2025
1
SIMATS ENGINEERING
Saveetha Institute of Medical and Technical Sciences
Chennai-602105
DECLARATION
We, Gangisetty Nithin kumar, Gutam sudheer kumar of the AI and ML ,ECE , Saveetha
Institute of Medical and Technical Sciences, Saveetha University, Chennai, hereby declare that
the Capstone Project Work entitled Deploy a secure web server with ACLs and packet filtering..
is the result of our own bonafide efforts. To the best of our knowledge, the work presented
herein is original, accurate, and has been carried out in accordance with principles of
engineering ethics.
Place:
Date:
2
SIMATS ENGINEERING
Saveetha Institute of Medical and Technical Sciences
Chennai-602105
BONAFIDE CERTIFICATE
This is to certify that the Capstone Project entitled “Deploy a secure web server with
ACLs and packet filtering.” has been carried out Gangisetty Nithin Kumar ,Gutam sudheer
kumar under the supervision of Kumarn G and is submitted in partial fulfilment of the
requirements for the current semester of the B.Tech AI and ML ,ECE program at Saveetha
Institute of Medical and Technical Sciences, Chennai.
SIGNATURE SIGNATURE
Dr T J Nagalakshmi kumaran G
Program Director Professor
Department Of ECE Department of CSE
Saveetha School of Engineering Saveetha School of Engineering
SIMATS SIMATS
3
ACKNOWLEDGEMENT
We would like to express our heartfelt gratitude to all those who supported and
guided us throughout the successful completion of our Capstone Project. We are deeply
thankful to our respected Founder and Chancellor, Dr. N.M. Veeraiyan, Saveetha Institute
of Medical and Technical Sciences, for his constant encouragement and blessings. We also
express our sincere thanks to our Pro-Chancellor, Dr. Deepak Nallaswamy Veeraiyan, and
our Vice-Chancellor, Dr. S. Suresh Kumar, for their visionary leadership and moral support
during the course of this project.
We are truly grateful to our Director, Dr. Ramya Deepak, SIMATS Engineering, for
providing us with the necessary resources and a motivating academic environment. Our
special thanks to our Principal, Dr. B. Ramesh for granting us access to the institute’s
facilities and encouraging us throughout the process. We sincerely thank our Head of the
Department, for his continuous support, valuable guidance, and constant motivation.
We are especially indebted to our guide, Kumaran G for his creative suggestions,
consistent feedback, and unwavering support during each stage of the project. We also
express our gratitude to the Project Coordinators, Review Panel Members (Internal and
External), and the entire faculty team for their constructive feedback and valuable inputs
that helped improve the quality of our work. Finally, we thank all faculty members, lab
technicians, our parents, and friends for their continuous encouragement and support.
4
TABLE OF CONTENT
S.NO CHAPTERS SUB TOPICS PAGES
1 Abstract 7
1.3 Significance
2
Chapter 1 1.4 Scope
4.4 Recommendations
7 Chapter 6 Conclusion 21
8 References 23
9 Appendices 24
5
List of tables
S.NO Name Page no
6
ABSTRACT
This capstone project focuses on deploying a secure web server using Apache with a strong
emphasis on Access Control Lists (ACLs) and packet filtering to protect against common
cybersecurity threats. The project simulates a real-world hosting environment in which a
website must be delivered securely over HTTPS, hardened against attacks like SQL injection,
and monitored through vulnerability assessments. With the increasing demand for robust
cybersecurity, especially in online services and e-commerce, securing web servers has become
a top priority.
The simulation demonstrates not just how to host a secure website, but also how to proactively
defend against intrusion attempts. Future scalability includes integrating fail2ban, web
application firewalls (WAFs), and cloud-based security solutions.
Chapter 1:
INTRODUCTION
1.1 Background and Context
In today's digital world, web servers play a pivotal role in delivering content, services, and
applications to end users. Whether it's a personal blog, a corporate portal, or a critical e-
commerce platform, the web server is often the frontline of interaction between the user and
the organization. However, this exposure also makes web servers one of the most targeted
components in any network infrastructure. As a result, ensuring their security has become not
just necessary, but imperative.
Traditionally, many web server deployments focused on functionality and performance, with
security considered as an afterthought. This approach leaves systems vulnerable to a wide range
of attacks, including SQL injection, directory traversal, brute-force login attempts, and
distributed denial-of-service (DDoS) attacks. These vulnerabilities can lead to severe
consequences such as data breaches, service disruption, unauthorized access, and reputational
damage.
This capstone project addresses the increasing need for secure server deployments by
demonstrating how to configure a web server—specifically Apache—on a Linux environment
using Access Control Lists (ACLs) and packet filtering mechanisms. The project simulates a
secure hosting environment, enforcing strict rules on who can access what, from where, and
7
under what conditions. Additionally, it highlights the importance of encryption (via
HTTPS) and real-time vulnerability testing as part of a comprehensive defense strategy.
The deployment also serves as a learning model to understand how layered security can be
applied effectively using freely available open-source tools. From application-level security
through proper Apache configurations to network-level defenses using tools like iptables, this
simulation encapsulates a complete approach toward securing a web server against modern
threats.
The motivation behind this project arises from the alarming rise in cyber-attacks targeting web
services globally. Every day, new vulnerabilities are discovered in popular software and server
stacks. Reports show that a significant number of these attacks could have been prevented with
basic configuration changes or network filtering. Unfortunately, many developers and system
administrators lack practical exposure to security implementation at the deployment level.
As a student of Computer Networks and Security, it is critical to move beyond theory and
engage with real-world challenges. This project provides a platform to understand how web
servers work behind the scenes, how they can be exploited, and more importantly, how they
can be defended. It is a hands-on approach to apply concepts like ACLs, firewall configuration,
SSL/TLS encryption, and vulnerability assessment in a practical environment.
This project is also highly relevant in a professional context. With the growing demand for
DevSecOps (Development, Security, and Operations) professionals, the ability to securely
deploy and maintain web infrastructure is a sought-after skill. By implementing and simulating
a secure server deployment, this project not only contributes to academic growth but also
enhances industry readiness.
Implementing a secure web server using technologies such as Apache combined with ACLs
and iptables ensures multiple layers of defense. ACLs allow administrators to define who can
access specific files, directories, or server functions based on IP address or user authentication.
Packet filtering ensures that only legitimate and necessary traffic is allowed to reach the server.
8
Furthermore, by enabling HTTPS with OpenSSL, all data exchanged between the user and
server is encrypted, ensuring confidentiality and integrity. The use of tools such
as Nikto and Nmap allows for regular vulnerability assessments, helping administrators
identify and patch weaknesses before they are exploited.
The goal of web server security is not just to prevent unauthorized access but to establish
a trustworthy platform that supports scalability, reliability, and compliance with data protection
laws and industry best practices.
This project simulates the secure deployment of a web server in a controlled lab environment
to showcase how a combination of software tools and configuration techniques can lead to a
robust and resilient server setup. The simulation includes the following components:
Apache Web Server Setup: Configuration of the Apache server to host a sample website
with secure HTTP (HTTPS) using SSL/TLS certificates generated through OpenSSL.
Packet Filtering using iptables: Creation of firewall rules that allow only specific ports
(e.g., port 443 for HTTPS) while blocking all unnecessary inbound and outbound
connections, thereby minimizing attack vectors.
Security Testing with Tools: Use of Nikto to scan for common vulnerabilities
and Nmap to verify exposed services and validate firewall configurations.
This simulation not only illustrates how to deploy a functional and secure web server but also
provides a foundation to build more complex security mechanisms in future enhancements. It
serves as an educational platform to practice DevOps security and understand the intricacies of
server hardening.
This project focuses on demonstrating key security measures that can be applied to a web server
at the application and network layers. However, like all simulations, it operates under certain
constraints:
Scope:
Configure iptables to allow only necessary ports and block malicious traffic
Conduct vulnerability assessments using Nikto and Nmap
9
Demonstrate how logs can be used to monitor attacks
Limitations:
The project uses a virtual or isolated network environment; it is not tested in a live
public-facing setup
Chapter 2:
PROBLEM IDENTIFICATION AND ANALYSIS
The internet has become an essential platform for communication, commerce, education, and
information sharing. As more services shift online, web servers have become critical
infrastructure components. However, they are also among the most targeted systems by cyber
attackers. In this chapter, we examine the key security issues associated with traditional web
server deployments and analyze how common configurations fall short of modern security
standards. These insights provide the justification for designing a secure deployment strategy
using Access Control Lists (ACLs) and packet filtering
Web servers are inherently exposed to the internet, making them vulnerable to a range of
threats. Attackers continuously scan for open ports, misconfigured services, and outdated
software. According to multiple cybersecurity reports, attacks on web applications account for
over 40% of all reported breaches. Some of the most common threats include:
SQL Injection
Directory Traversal
10
Man-in-the-Middle Attacks (MITM)
Problems Identified:
Servers are often deployed with default configurations, which may expose sensitive
directories or services.
Public IP exposure of admin panels or login pages increases the risk of brute-force
attacks.
Access Control Lists (ACLs) define who can access which resources on a server. However, in
many deployments, ACLs are either misconfigured or completely absent. This allows
unauthorized users or bots to interact with sensitive resources.
Common Scenarios:
Consequences:
Key Issues:
11
Open ports provide attackers entry points for exploitation
Problem Summary:
Packet filtering with tools like iptables is critical to deny all traffic by default and allow only
explicitly required services, reducing exposure and increasing control.
A significant number of web servers still rely on HTTP rather than HTTPS. HTTP transmits
data in plaintext, making it susceptible to interception by attackers through MITM attacks,
especially in open networks.
Implementing HTTPS using SSL/TLS encryption ensures the confidentiality and integrity of
data exchanged between users and the server. Using self-signed or CA-signed certificates
via OpenSSL can secure even internal or test servers.
Many server administrators overlook the importance of regular vulnerability scans. Even if the
initial deployment is secure, ongoing software updates and configuration changes can introduce
new weaknesses.
12
Dangerous scripts
Directory indexing
Outdated components
Regular testing ensures proactive security management and aids in early threat detection.
A well-secured server integrates all layers of defense: application, network, and data. ACLs
work in conjunction with iptables, HTTPS encryption, and automated vulnerability scanning
to provide a holistic defense mechanism.
13
CHAPTER 3
SOLUTION DESIGN AND IMPLEMENTATION
3.1 Development and Design Process
The project was developed in two key modules to ensure secure web server deployment and
evaluation through vulnerability testing. Each module follows a structured approach for
configuration, simulation, and evaluation
This module involved setting up a secure web server using Apache HTTP Server with HTTPS
support.
Steps Taken:
1. Server Installation:
2. SSL/TLS Configuration:
iptables rules were applied to allow only essential ports (22 for SSH, 443 for
HTTPS).
This module focused on evaluating the security of the configured web server.
Steps Taken:
14
Nikto: A web vulnerability scanner used to identify outdated software, directory
listings, and misconfigurations.
Nmap: Used to verify port states and detect any open unintended services.
2. Simulated Attacks:
3. Hardening Measures:
15
Packet filtering firewall using iptables
This modular design ensures that both deployment and testing are executed in isolated
yet complementary phases.
Standard Application
16
CHAPTER 4:
RESULTS AND RECOMMENDATIONS
4.1 Evaluation of Results
Each module was tested for functionality, security, and performance.
Test Result
Browsers initially flagged self-signed certificates. This was resolved by importing the
certificate manually.
Some results needed verification, as tools often report deprecated configurations even if
patched.
17
Misconfigured iptables rules caused service downtime during testing phases.
Access Testing:
Multiple IPs were used to test ACL effectiveness, requiring network reconfiguration.
Add ModSecurity:
Automated Monitoring:
Use tools like Fail2Ban or UFW with logs for brute-force protection.
Containerize Deployment:
Dockerize the web server for portability and isolated environment testing.
4.4 Recommendations
18
CHAPTER 5:
REFLECTION ON LEARNING AND PERSONAL
DEVELOPMENT
5.1 Key Learning Outcomes
These skills are highly relevant for roles in DevOps, System Administration, and
Cybersecurity.
5.1.3 Problem Solving and Critical Thinking
This project required troubleshooting configuration errors, identifying security gaps, and
understanding rule-based logic (especially in iptables). It taught me how layers of security
interact and how minor misconfigurations can expose systems.
Incorrect <Directory> and VirtualHost settings initially broke SSL enforcement. By reviewing
documentation and logs, I learned how Apache parses .conf files and how to debug such errors.
An incorrectly applied firewall rule locked me out of SSH access. I learned the importance
of established/related rules and safe practices like testing rules in a screen session.
19
The .htaccess rules required exact IP format and proper ordering. Through trial and error, I
figured out how to whitelist specific users securely.
All configurations were created with reusability, modularity, and clarity in mind—traits
expected in professional IT environments.
This project showed how even basic web servers are vulnerable without proper configuration.
I learned:
These insights are essential for deploying production-grade services and align well with
industry expectations.
20
CHAPTER 6:
CONCLUSION
6.1 Summary of Key Findings
This capstone project focused on the deployment and securing of a web server using Apache
with HTTPS encryption, Access Control Lists (ACLs), and iptables-based firewall rules. The
goal was to create a secure and hardened environment suitable for hosting web applications
with limited access and minimized vulnerabilities.
2. Access Control using .htaccess and Apache’s configuration files effectively restricted
access to specific IP addresses.
3. iptables firewall efficiently filtered traffic, allowing only SSH (port 22) and HTTPS
(port 443) while blocking all other services.
4. Basic vulnerability scans using tools like Nikto and Nmap confirmed that the server
had no critical exposure.
Each component was tested independently, and the overall system demonstrated strong
alignment with secure web hosting principles. The project highlighted how layered security
(application + network level) helps reduce the attack surface in web environments.
Academic Significance
2. It bridged the gap between theory (e.g., TCP/IP model, HTTPS protocol) and practical
implementation of security measures on a real Linux server environment.
Professional Significance
1. Working hands-on with Apache, iptables, and access control mechanisms provided real-
world exposure to server hardening, network security, and configuration best practices.
3. The techniques and tools explored align with the requirements of certifications
like RHCE, CEH, and CompTIA Security+.
21
Key Concepts Emphasized:
Packet-level filtering
This capstone project served as a hands-on blueprint for deploying a web server with strong
security practices. From configuring Apache to enforcing HTTPS and firewall policies, each
step reinforced the importance of proactive defense mechanisms.
Through this journey, I improved my systematic thinking, debugging ability, and gained clarity
on how secure systems are built from the ground up.
Going forward, the technical depth and practical insights gained from this project will help me:
Continue exploring automation and cloud-based server deployment (e.g., AWS EC2
with security groups)
This project has strengthened my resolve to pursue a career path in Cybersecurity, Linux
Administration, or DevOps, where secure and scalable deployments are crucial.
22
References
1. Smith, J., & Anderson, L. (2022). Apache Web Server Hardening for Beginners. Journal
of Web Security, 14(3), 112–124. https://doi.org/10.1016/j.jws.2022.03.005
2. Martin, E., & Zhao, F. (2021). Effective use of iptables for securing Linux systems.
International Journal of Cybersecurity Studies, 7(2), 88–
102. https://doi.org/10.1109/IJCSS.2021.00788
3. NIST. (2020). Security Configuration Checklist for Apache HTTP Server. National
Institute of Standards and Technology. https://csrc.nist.gov/publications
4. Rashid, T., & Singh, K. (2023). Evaluating HTTPS Performance Using Self-Signed vs.
CA Certificates. Journal of Internet Infrastructure, 10(1), 41–
53. https://doi.org/10.14569/JIII.2023.01041
5. Red Hat Enterprise Docs. (2024). Using iptables and firewalld for Secure Linux Server
Deployment. https://access.redhat.com/documentation/en-us
7. Nmap Official Guide. (2022). Nmap Network Scanning: The Official Guide to Network
Discovery and Security Scanning. https://nmap.org/book/
10. Scarfone, K., & Mell, P. (2021). Guide to Intrusion Detection and Prevention Systems
(IDPS). NIST Special Publication. https://nvlpubs.nist.gov/nistpubs
11. Kali Linux Documentation. (2023). Using Kali Tools for Penetration
Testing. https://www.kali.org/docs/
15. CIS Benchmarks. (2024). CIS Apache HTTP Server Benchmark v1.3.0. Center for
Internet Security. https://www.cisecurity.org/benchmark/apache
23
APPENDIX
Appendix A: System Configuration Details
<VirtualHost *:443>
ServerAdmin admin@example.com
DocumentRoot /var/www/html
ServerName www.secureweb.local
SSLEngine on
SSLCertificateFile /etc/ssl/certs/selfsigned.crt
SSLCertificateKeyFile /etc/ssl/private/selfsigned.key
<Directory /var/www/html>
AllowOverride All
Require ip 192.168.1.0/24
</Directory>
24
ErrorLog ${APACHE_LOG_DIR}/error.log
</VirtualHost>
# Default policy
# Allow loopback
-newkey rsa:2048 \
-keyout /etc/ssl/private/selfsigned.key \
-out /etc/ssl/certs/selfsigned.crt
25
+ Server: Apache/2.4.52 (Ubuntu)
26