To safeguard our infrastructure, we apply a multi-layered firewall configuration, which effectively controls and restricts incoming and outgoing traffic. Each port and protocol is carefully reviewed and allowed only if essential for critical services. We actively use advanced filtering methods, including blocking suspicious IP addresses, keyword-based control, and real-time connection monitoring. These measures significantly reduce vulnerabilities and provide a high level of security for our systems against external threats such as DDoS attacks and unauthorized access.