
Leasing and Off-Plan Specialist
ctually, you should stop opening ports directly. Now that you are setting up Nginx, we are moving from "Direct IP access" to "Domain-based access," which is much more secure.
Here is the strategy you should follow:
Instead of opening a new port for every app (3000, 3001, 3002, etc.), you only need to open the standard web ports. Nginx will act as the Gatekeeper. It listens on port 80/443 and decides which internal Docker container should receive the traffic based on the URL (recruiting.darkalphacapital.com vs just-era.com).
You only need to allow three things for a professional setup:
Run these commands:
Bash
# Allow the web traffic sudo ufw allow 80/tcp sudo ufw allow 443/tcp # Deny the direct docker ports (optional but safer) # Once your Nginx is working, you don't want people bypassing it sudo ufw delete allow 3000/tcp sudo ufw delete allow 3001/tcp
Since you've already run the ufw allow commands earlier, you are fine for now. But as soon as you finish the Nginx config and Certbot (SSL) steps I gave you in the previous message, I recommend deleting the individual port rules (3000 and 3001) to lock down your server.
Have you already added the "A Record" to your DNS settings for the subdomain? If so, we can check if it has propagated yet.