-
Notifications
You must be signed in to change notification settings - Fork 2
Secure your LA infrastructure
vjrj edited this page May 6, 2019
·
26 revisions
Draft
Allow basic input traffic 22/80/443 (tcp) from the outside. Restrict external access to solr
web interface.
If you want to restring the internal traffic is more complex. Initially you can open all ports between your VMs and internal IP address as a start while you discover which ports use each services and adapt it to your infrastructure.
If you don't need a complicated firewall configuration you can use this ansible ufw role to fast configure the iptables
in your machines.
Use fail2ban
for prevent brute force in those services (http/s and ssh authentication). If you use wordpress in your node, also there is a good fail2ban wordpress plugin that integrates well with fail2ban
.
- Basic Auth in your LA node without CAS
- this ansell comment about a solr6 security issue
Index
- Wiki home
- Community
- Getting Started
- Support
- Portals in production
- ALA modules
- Demonstration portal
- Data management in ALA Architecture
- DataHub
- Customization
- Internationalization (i18n)
- Administration system
- Contribution to main project
- Study case