Solved

to secure network in RHEL VM

Posted on 2014-02-04
4
386 Views
Last Modified: 2014-02-10
Hi All,

I have one RHEL virtual machine on VMware - connected with 3 difrent network - please advice how to secure my server and what tools could be used?
0
Comment
Question by:apunkabollywood
  • 2
4 Comments
 
LVL 13

Expert Comment

by:Daniel Helgenberger
Comment Utility
Please elaborate a little more about witch version of RHEL and witch services/daemons the VM is running.

The default settings of a RHEL machine are already good to connect it to the public internet. This means in particular:
- SElinux, mandatory access control, in enforcing mode,
- Firewall turned on, allowing only SSH and any related connections

After the initial configuration is done you should turn off root logins in SSH and disallow challenge / response authentication (basically allowing only SSH logins with valid keys).

The tools you are working with most foremost is iptables for firewall rules and SElinux as mandatory access control.
If you keep the data locations for your services (eg. /var/www as http-root) to the default, you will rarely need to interact with SElinux. Also keep in mind if you have custom build software, you may need to create custom rules or even turn off SElinux.

If you provide more info, I can assist you better.
0
 
LVL 25

Accepted Solution

by:
madunix earned 500 total points
Comment Utility
I don't know which security tips are related to your systems, but it's a good practice to find two/three or multiple sources of information, this way you can pick more security tips. You can go from more generalist tips to more specific tips, that seems to be a good approach to secure your servers.

I would implement iptables as said above, with iptables you can do
. Blocking a Single IP Address
. Allowing All Traffic from an IP Address
. Blocking a Port From All Addresses
. Allowing a Single Port from a Single IP
. Reroute Traffic

For example you can route all traffic that comes to the port XXXX to YYYY. This means that the incoming tcp connection can come from both port YYYY and XXXX.
iptables -t nat -A PREROUTING -p tcp -d A.B.C.D --dport XXXX -j DNAT --to A.B.C.D:YY

Additionally Patch the system, use the right user:group, turn off unwanted services, disable unused modules and ports, tune server, hide config, restrict access, firewall ....etc.

Red Hat Linux Server Security Checklist:
http://www.howtogeek.com/wiki/Using_Iptables_on_Linux
http://www.thegeekstuff.com/2011/06/iptables-rules-examples/
http://www.cyberciti.biz/faq/iptables-block-port/
http://people.redhat.com/sgrubb/files/hardening-rhel5.pdf
http://www.nsa.gov/ia/_files/factsheets/rhel5-pamphlet-i731.pdf
http://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/pdf/Security_Guide/Red_Hat_Enterprise_Linux-6-Security_Guide-en-US.pdf
http://www.tecmint.com/linux-server-hardening-security-tips/
http://www.cyberciti.biz/tips/linux-security.html
http://www.utsa.edu/oit/PDF/linuxchecklist.pdf
http://linuxlyfe.com/centos/basic-web-server-security-checklist
http://onedollardata.wordpress.com/2010/06/08/red-hat-linux-server-security-checklist/
http://www.sans.org/score/checklists/linuxchecklist.pdf
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/index.html
0
 

Author Comment

by:apunkabollywood
Comment Utility
Thank you for your valuable suggestion but let me more specific about requirements

1-Actually it will acting as a Storage NODE and we are using EMC networker and its require root role - so i need to secure as per this so that no hacking or etc possible with proper monitoring?

2. I want to specify specific VLAN access from specific NIC card - please help me with that kind of settings?

3. SSH only allow from specific admin port not from all?

Please help me if you have more suggestions on the same
0
 

Author Closing Comment

by:apunkabollywood
Comment Utility
Thank you - Helps me a lot
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

HOW TO: Install and Configure VMware vSphere Hypervisor 6.5 (ESXi 6.5), Step by Step Tutorial with screenshots. From Download, Checking Media, to Completed Installation.
HOW TO: Connect to the VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere (HTML5 Web) Host Client 6.5, and perform a simple configuration task of adding a new VMFS 6 datastore.
Advanced tutorial on how to run the esxtop command to capture a batch file in csv format in order to export the file and use it for performance analysis. He demonstrates how to download the file using a vSphere web client (or vSphere client) and exp…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now