Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 414
  • Last Modified:

to secure network in RHEL VM

Hi All,

I have one RHEL virtual machine on VMware - connected with 3 difrent network - please advice how to secure my server and what tools could be used?
0
apunkabollywood
Asked:
apunkabollywood
  • 2
1 Solution
 
Daniel HelgenbergerCommented:
Please elaborate a little more about witch version of RHEL and witch services/daemons the VM is running.

The default settings of a RHEL machine are already good to connect it to the public internet. This means in particular:
- SElinux, mandatory access control, in enforcing mode,
- Firewall turned on, allowing only SSH and any related connections

After the initial configuration is done you should turn off root logins in SSH and disallow challenge / response authentication (basically allowing only SSH logins with valid keys).

The tools you are working with most foremost is iptables for firewall rules and SElinux as mandatory access control.
If you keep the data locations for your services (eg. /var/www as http-root) to the default, you will rarely need to interact with SElinux. Also keep in mind if you have custom build software, you may need to create custom rules or even turn off SElinux.

If you provide more info, I can assist you better.
0
 
madunixChief Information Security Officer Commented:
I don't know which security tips are related to your systems, but it's a good practice to find two/three or multiple sources of information, this way you can pick more security tips. You can go from more generalist tips to more specific tips, that seems to be a good approach to secure your servers.

I would implement iptables as said above, with iptables you can do
. Blocking a Single IP Address
. Allowing All Traffic from an IP Address
. Blocking a Port From All Addresses
. Allowing a Single Port from a Single IP
. Reroute Traffic

For example you can route all traffic that comes to the port XXXX to YYYY. This means that the incoming tcp connection can come from both port YYYY and XXXX.
iptables -t nat -A PREROUTING -p tcp -d A.B.C.D --dport XXXX -j DNAT --to A.B.C.D:YY

Additionally Patch the system, use the right user:group, turn off unwanted services, disable unused modules and ports, tune server, hide config, restrict access, firewall ....etc.

Red Hat Linux Server Security Checklist:
http://www.howtogeek.com/wiki/Using_Iptables_on_Linux
http://www.thegeekstuff.com/2011/06/iptables-rules-examples/
http://www.cyberciti.biz/faq/iptables-block-port/
http://people.redhat.com/sgrubb/files/hardening-rhel5.pdf
http://www.nsa.gov/ia/_files/factsheets/rhel5-pamphlet-i731.pdf
http://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/pdf/Security_Guide/Red_Hat_Enterprise_Linux-6-Security_Guide-en-US.pdf
http://www.tecmint.com/linux-server-hardening-security-tips/
http://www.cyberciti.biz/tips/linux-security.html
http://www.utsa.edu/oit/PDF/linuxchecklist.pdf
http://linuxlyfe.com/centos/basic-web-server-security-checklist
http://onedollardata.wordpress.com/2010/06/08/red-hat-linux-server-security-checklist/
http://www.sans.org/score/checklists/linuxchecklist.pdf
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/index.html
0
 
apunkabollywoodAuthor Commented:
Thank you for your valuable suggestion but let me more specific about requirements

1-Actually it will acting as a Storage NODE and we are using EMC networker and its require root role - so i need to secure as per this so that no hacking or etc possible with proper monitoring?

2. I want to specify specific VLAN access from specific NIC card - please help me with that kind of settings?

3. SSH only allow from specific admin port not from all?

Please help me if you have more suggestions on the same
0
 
apunkabollywoodAuthor Commented:
Thank you - Helps me a lot
0

Featured Post

Microsoft Certification Exam 74-409

VeeamĀ® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now