×

This page gathers verifiable technical evidence demonstrating that the infrastructure presented in this portfolio has been operated in a real environment.

The evidence below can be externally validated or inferred from technical behaviors that cannot be realistically simulated without an actual infrastructure.

Edge Traffic — Cloudflare

Access to the site occurs through the Cloudflare network, responsible for TLS termination and edge protection.

$ curl -I https://alexandraidc.com

HTTP/1.1 200 OK
Server: cloudflare
CF-RAY: 9b7bc4cfba26d382-FRA
cf-cache-status: DYNAMIC
alt-svc: h3=":443"; ma=86400

The headers Server: cloudflare and CF-RAY confirm that the request was processed at Cloudflare’s edge. The suffix -FRA indicates the point of presence (Frankfurt).

Perimeter Firewall and NAT-Based Publishing

The application does not have a direct public IP. Service exposure occurs exclusively through a perimeter firewall, responsible for performing NAT / Port Forward to a VM within a private network.

This model centralizes access control, eliminates direct VM exposure, and is characteristic of dedicated firewalls such as pfSense.

Cloudflare does not perform NAT and the web server does not have a public IP, which implies the presence of an intermediate firewall.

Network Isolation and Segmentation

The application, database, and monitoring VMs operate exclusively within a private network, with no direct external access.

This level of isolation cannot be achieved through application configuration alone, requiring network-layer control.

Active Monitoring

The environment is continuously monitored by internal systems, tracking availability, service status, and operational metrics.

The monitoring system operates within the internal network with no public exposure.

Real Production Environment

Below are real visual records of the environment. The images use standardized size and proportions to preserve visual consistency and avoid distortion.