ShieldWall embraces the zero-trust principle and instruments your server firewall to block inbound connections from every IP on any port, by default. The website allows you to push policies to your agents and temporarily unlock certain ports from your IP.
Quick Start
Download the latest precompiled release and install it
with (adjust the url to the latest version and your server architecture).
mkdir /tmp/sw
cd /tmp/sw
wget https://github.com/evilsocket/shieldwall/releases/download/v1.0.0/shieldwall-agent_1.0.0_linux_arm64.tar.gz
tar xvf shieldwall-agent_1.0.0_linux_arm64.tar.gz
sudo ./install.sh
The agent is now installed as a systemd service, but it is not yet started nor enabled for autostart. You will first
need to register an account on https://shieldwall.me/ and then edit the /etc/shieldwall/config.yaml configuration
file, making sure it matches what you see on the agent page.
It is very important that you double check the configuration before the next step, if the agent can't authenticate
because of a wrong token, you will be locked out by the firewall and unable to log back.
You can now enable the service and start it. If configured so, it will automatically download and install its updates
from github:
sudo systemctl enable shieldwall-agent
sudo service shieldwall-agent start
Log into your https://shieldwall.me/ account to control the agent.
Compile from Sources
https://github.com/evilsocket/shieldwall/wiki
License
Released under the GPL3 license.