Luveedu Cloud Ultra Security & Firewall - Just Ultimate Security

LCUSF — Luveedu Cloud Ultra Security Firewall

Enterprise-grade Linux web security platform — intelligent traffic analysis, multi-layer automated defense, and a real-time operations dashboard built for production infrastructure.

LCUSF delivers a full security stack in a single deployment: WAF, brute-force protection, malware scanning, proactive threat intelligence, IP reputation enforcement, bot challenge injection, and deep process monitoring — all managed from one unified control plane.


:shield: Platform Overview

LCUSF operates as a deeply integrated security layer between the internet and your web stack. It combines:

  • Network-layer enforcement via iptables/ip6tables and high-performance ipset matching

  • Application-layer inspection with signature and AI-hybrid WAF logic

  • Behavioral analysis to detect and pre-empt evolving attack patterns

  • Operational intelligence delivered through a real-time security dashboard

Designed for hosting providers, managed service operators, and security-focused sysadmins who need more than a firewall — LCUSF is a full security operations platform.


:gear: System Requirements

| Requirement | Specification |

|—|—|

| Operating System | Ubuntu 20.04+, Debian 10+, AlmaLinux 8+, Rocky Linux 8+, CentOS Stream 8+, Fedora 36+ |

| Web Server | Apache2, Nginx, or OpenLiteSpeed (CyberPanel) |

| Python | 3.9 or higher |

| Database | MySQL 5.7+ or MariaDB 10.3+ |

| Firewall Subsystem | iptables, ip6tables, ipset |

| Access Level | Root or passwordless sudo |

| Internet Access | Required during installation |

| RAM | 512 MB minimum — 1 GB+ recommended |

| Disk Space | 500 MB free space minimum |


:rocket: Installation

The universal installer auto-detects your environment — CyberPanel + OpenLiteSpeed, standalone Apache, or standalone Nginx — and deploys the appropriate integration automatically. No manual selection required.


curl -fsSL https://ultrasecurity.luveedu.dev/bootstrap/install.sh | bash

Once installed, access the security dashboard at:


http://YOUR_SERVER_IP:8182


:key: Licensing

LCUSF requires a valid license to operate. After installation, the dashboard will present a License Required screen until a license is activated.

Getting a License

Visit the Luveedu Cloud portal to purchase a license:


https://ultrasecurity.luveedu.dev/buy-license ( coming soon ) ( use demo license )

A 30-day free trial is also available directly from the License Required page — no purchase needed to evaluate the platform.

Activating Your License

  1. Open the dashboard at http://YOUR_SERVER_IP:8182

  2. On the License Required screen, enter your license key in the Activate a license form

  3. Click Activate License — the server contacts the Luveedu portal to validate and bind the key

  4. On success, the dashboard loads immediately

Each license key is bound to a single server IP at activation time.

Checking License Status

From the command line:


lcusf --license-status

From the dashboard, navigate to Settings → License Info to view the full license details including key, type, expiry, and last validation timestamp.

Renewing or Managing Your License

  • Renew: https://ultrasecurity.luveedu.dev/renew-license

  • Admin portal: https://cloud.luveedu.com

  • Support: [email protected]

If your license is suspended or requires attention, use the Refresh Status button on the License Required page to re-sync with the portal immediately.


:brain: Feature Reference

1. Dashboard — Real-Time Security Intelligence

The central command surface providing live visibility into platform state and active threat activity.

Dashboard

  • Live telemetry charts — request throughput, block rate, and attack trend graphs updated in real time

  • System health indicators — CPU load, memory utilization, and system pressure at a glance

  • Engine status panel — operational state of all active security engines and background workers

  • Security event counters — total blocks, active threats, scan results, and brute-force activity

  • Activity feed — timestamped stream of recent security events with type classification

  • Dark/light mode with persistent preference and smooth transition support


2. WAF Blocks — Web Application Firewall Event Log

Full audit trail of all firewall enforcement decisions with operational context.

WAF Blocks

  • Request-level WAF event log — every blocked request recorded with source IP, country, HTTP method, URI, and enforcement action

  • Attack classification — identifies SQLi, XSS, path traversal, command injection, and protocol abuse patterns

  • Payload inspection results — signature match details included for forensic and compliance workflows

  • Country of origin tagging — GeoIP-resolved flag and ISO country code per event

  • AI heuristic flags — events flagged by behavioral analysis are distinctly identified

  • High-volume filtering controls — search and filter log entries by IP, action type, country, or URI pattern

  • Pagination and export — supports large event volumes with configurable page depth


3. Bruteforce Alerts — Authentication Attack Detection

Detects and neutralizes credential stuffing and brute-force campaigns across authentication surfaces.

Bruteforce Alerts

  • Multi-service brute-force monitoring — SSH, FTP, SMTP, POP3, IMAP, WordPress login, and XML-RPC endpoints

  • Threshold-based detection — configurable attempt limits before enforcement triggers

  • Attacker IP isolation — confirmed brute-force sources blocked at firewall level automatically

  • Block synchronization — brute-force blocks propagate to the central IP block enforcement layer

  • Attack timeline view — per-IP attempt history with timestamps and targeted service

  • Repeat offender tracking — identifies IPs with multi-session attack histories

  • Maintenance controls — flush stale records, reset counters, and clean up expired enforcement state


4. Malware Scanner — File System Threat Detection

Multi-mode malware scanning with AI-enhanced detection for web-hosted environments.

Malware Scanner

  • Dual-engine scanning — ClamAV signature scanning combined with AI behavioral pattern analysis

  • Scan mode selection — Rapid (lightweight targeted), Deep (full filesystem traversal), Suspicious-Only (high-entropy and anomalous files)

  • Web root focus — scanner tuned to detect web shells, backdoors, cryptominers, and obfuscated droppers in served directories

  • Quarantine actions — infected files can be isolated or deleted with full audit logging

  • Historical scan records — per-scan result archive with timestamps, file paths, threat classifications, and action taken

  • Scheduled scanning support — automated periodic scan execution with configurable frequency

  • Threat severity grading — results classified from informational to critical with recommended remediation actions


5. Proactive Defence — Threat Intelligence Pre-Emption

Stops known-bad traffic before it reaches your application using curated global threat intelligence.

Proactive Defence

  • IP reputation blocklist enforcement — automatic blocking of IPs appearing in trusted abuse and threat feeds

  • CIDR-level blocking — entire malicious network ranges blocked efficiently using ipset matching

  • Country-level access control — whitelist or block traffic by country with granular exceptions

  • Tor and VPN exit node detection — configurable enforcement against anonymization network traffic

  • Threat feed management — view, enable, disable, or refresh individual intelligence sources

  • Feed synchronization scheduling — pull updated threat intelligence on configurable intervals

  • AI-enriched scoring — threat confidence scores attached to blocked entries for operator review

  • Allowlist exception management — trusted IPs and CIDR ranges exempt from proactive enforcement


6. Reputation Management — IP Reputation Enforcement

Real-time IP reputation lookup and cloud-synchronized threat scoring for inbound traffic sources.

Reputation Management

  • Per-IP reputation queries — instant lookup of any IP against cloud threat intelligence database

  • Abuse confidence scoring — numeric risk score with category breakdown (spam, brute-force, DDoS source, scanning)

  • ISP and ASN identification — context enrichment showing hosting provider, ASN, and organization per IP

  • Historical abuse records — total reported incident count and last-seen attack timestamps

  • Cloud sync — reputation data synchronized with Luveedu Cloud threat intelligence for current accuracy

  • Bulk IP assessment — evaluate large sets of IPs from logs or traffic captures

  • Enforcement integration — reputation-confirmed threats can be pushed directly to the IP blocklist


7. Process Monitor — OS-Level Threat Termination

Detects and kills malicious or anomalous OS processes spawned by web application compromise.

Process Monitor

  • Live process inspection — real-time process tree view with CPU, memory, owner, and launch path

  • Suspicious process detection — AI classification of process behavior against known malware and webshell spawn patterns

  • Automatic kill mode — configurable auto-termination of processes exceeding suspicion threshold

  • Manual termination controls — operator-initiated kill with confirmation and logging

  • Process ancestry analysis — identifies processes spawned by web server workers (PHP, Python, Node) for post-exploitation detection

  • Cryptominer detection — specialized detection for CPU-intensive unauthorized mining processes

  • Process execution history — audit log of all terminated processes with timestamps, owner, and kill reason


8. Security Logs — Full Audit Trail

Comprehensive event log aggregating all security activity across engines and enforcement layers.

Security Logs

  • Unified log view — single interface covering WAF events, brute-force activity, scanner results, and engine alerts

  • Severity-tier filtering — filter by critical, high, medium, low, and informational events

  • Source IP and service tagging — every log entry includes source IP, target service, and enforcement layer

  • Event deduplication — repeated identical events collapsed with occurrence count to reduce noise

  • Time range selection — filter log view to custom date/time windows for incident analysis

  • Export capability — log data exportable for external SIEM ingestion or compliance reporting

  • Persistent audit retention — log records retained with configurable rolling archive depth


9. System Reporting — Health and Operational Audit

Scheduled and on-demand reporting for service health, pipeline metrics, and security posture.

System Reporting

  • Service state snapshots — point-in-time records of all active security engine health

  • Pipeline throughput metrics — request processing rates, inspection volume, and enforcement action counts

  • Scheduled health audits — automated periodic capture of platform operational state

  • Incident correlation support — timestamped records assist post-incident timeline reconstruction

  • Trend analysis — block rate, scan result, and brute-force trend charts across configurable time windows

  • Report archive — historical audit records stored and browsable from the reporting interface

  • Export and share — reports exportable as structured data for compliance, handoff, or documentation


10. Blocklist / Whitelist — Manual Enforcement Controls

Direct operator control over IP enforcement state independent of automated engines.

Blocklist / Whitelist

  • Manual IP block entry — block any IPv4 or IPv6 address immediately with optional expiry

  • CIDR range blocking — block entire subnets using efficient ipset enforcement

  • Whitelist management — trusted IPs and ranges permanently exempt from all enforcement layers

  • Block reason tagging — operator-defined notes attached to each manual block for accountability

  • Expiry-based blocks — time-limited blocks that auto-expire without manual cleanup

  • Bulk import — load lists of IPs or CIDRs from file for rapid enforcement deployment

  • Block audit trail — complete history of who added or removed entries and when


11. Settings — Full Platform Administration

Central control plane for all engine configuration, security policy, notification routing, and platform lifecycle management.

Settings — Firewall Core

Settings — Malware Protection

Engine Controls

  • Enable/disable individual security engines independently (WAF, brute-force, malware scanner, proactive defence, process monitor, reputation)

  • Tune detection sensitivity thresholds per engine

  • Configure enforcement modes: monitor-only, auto-block, or quarantine

Alert and Notification Configuration

  • Email alert routing with configurable severity threshold triggers

  • Alert digest mode for high-volume environments

  • SMTP configuration with connection test capability

Platform Lifecycle

  • Update — pull and apply latest stable LCUSF release with full pre-flight validation

  • Fix / Repair — re-apply stable runtime configuration to recover from degraded states

  • Change Admin Password — secure credential rotation from within the dashboard

Configuration Portability

  • Export config — full platform configuration export for backup or migration

  • Import config — restore configuration from export archive

Access and Security

  • Session timeout configuration

  • Admin credential management

  • Login audit log


:puzzle_piece: Supported Environments

LCUSF integrates natively with all major Linux web stacks. The universal installer handles detection and configuration automatically.

| Environment | Integration Model |

|—|—|

| CyberPanel + OpenLiteSpeed | Native OLS WAF hook + CyberPanel service integration |

| Standalone Apache | mod_security compatible WAF injection + Apache service management |

| Standalone Nginx | Nginx module integration + custom ruleset deployment |

All environments share the same dashboard, API surface, and enforcement backend.


:counterclockwise_arrows_button: Operational Maintenance

All maintenance operations are accessible directly from the Settings panel in the dashboard. No SSH required for standard operations.

| Action | Description |

|—|—|

| Update | Pull and apply latest stable release; validates environment before applying |

| Fix / Repair | Re-deploy runtime configuration and recover from service degradation |

| Change Password | Rotate admin credentials securely from within the authenticated session |


:firecracker: Troubleshooting

Dashboard not reachable after install

  • Confirm the security platform services are active and listening on port 8182

  • Verify your server firewall or cloud security group allows TCP 8182 inbound

Blocked legitimate traffic

  • Use the Whitelist section in Blocklist / Whitelist to exempt trusted IPs immediately

  • Review WAF Blocks log to identify the triggering rule and adjust sensitivity in Settings

Update or Fix action not completing

  • Confirm internet connectivity from the host: curl -I https://ultrasecurity.luveedu.dev

  • Verify host package manager is healthy and retry the action from Settings

High false-positive rate from WAF

  • Reduce WAF detection sensitivity in Settings > Engine Controls

  • Review recent WAF Blocks log entries to identify the pattern causing false positives

Malware scanner not starting

  • Confirm ClamAV is installed and the signature database is current

  • Use the Fix action from Settings to restore scanner runtime state


:megaphone: Support & Enterprise Contact

For deployment assistance, enterprise onboarding, custom ruleset development, or priority support:


:briefcase: Summary

LCUSF is a production-hardened, multi-layer web security platform for Linux environments. It replaces the fragmented approach of managing iptables, fail2ban, ClamAV, and WAF rules independently — with a unified, intelligent, and operationally transparent security system.

| Capability | Delivered By |

|—|—|

| Real-time WAF | WAF Blocks engine + Security Logs |

| Brute-force defense | Bruteforce Alerts + auto-block synchronization |

| Malware detection | ClamAV + AI behavioral scanner |

| Threat pre-emption | Proactive Defence + reputation feeds |

| IP reputation enforcement | Reputation Management + cloud threat intelligence |

| Process-level detection | Process Monitor with auto-kill capability |

| Full operator visibility | Dashboard, Reporting, Security Logs |

| Operational continuity | Settings: update, fix, config export/import |


Want to collaborate? @usmannasir - Cyberpanel Team


There can be several bugs, its a very scratch security software, so there might be some mis alignments or bugs, which will be fixed overtime. Luveedu & Luveedu Cloud Team will maintain this project - PROMISED!

Opensource Model?

Should we also release a 100% FREEEEEE and Opensource Lightweight Module also?