?
Solved

to secure network in RHEL VM

Posted on 2014-02-04
4
Medium Priority
?
416 Views
Last Modified: 2014-02-10
Hi All,

I have one RHEL virtual machine on VMware - connected with 3 difrent network - please advice how to secure my server and what tools could be used?
0
Comment
Question by:apunkabollywood
  • 2
4 Comments
 
LVL 13

Expert Comment

by:Daniel Helgenberger
ID: 39831960
Please elaborate a little more about witch version of RHEL and witch services/daemons the VM is running.

The default settings of a RHEL machine are already good to connect it to the public internet. This means in particular:
- SElinux, mandatory access control, in enforcing mode,
- Firewall turned on, allowing only SSH and any related connections

After the initial configuration is done you should turn off root logins in SSH and disallow challenge / response authentication (basically allowing only SSH logins with valid keys).

The tools you are working with most foremost is iptables for firewall rules and SElinux as mandatory access control.
If you keep the data locations for your services (eg. /var/www as http-root) to the default, you will rarely need to interact with SElinux. Also keep in mind if you have custom build software, you may need to create custom rules or even turn off SElinux.

If you provide more info, I can assist you better.
0
 
LVL 25

Accepted Solution

by:
madunix earned 2000 total points
ID: 39832869
I don't know which security tips are related to your systems, but it's a good practice to find two/three or multiple sources of information, this way you can pick more security tips. You can go from more generalist tips to more specific tips, that seems to be a good approach to secure your servers.

I would implement iptables as said above, with iptables you can do
. Blocking a Single IP Address
. Allowing All Traffic from an IP Address
. Blocking a Port From All Addresses
. Allowing a Single Port from a Single IP
. Reroute Traffic

For example you can route all traffic that comes to the port XXXX to YYYY. This means that the incoming tcp connection can come from both port YYYY and XXXX.
iptables -t nat -A PREROUTING -p tcp -d A.B.C.D --dport XXXX -j DNAT --to A.B.C.D:YY

Additionally Patch the system, use the right user:group, turn off unwanted services, disable unused modules and ports, tune server, hide config, restrict access, firewall ....etc.

Red Hat Linux Server Security Checklist:
http://www.howtogeek.com/wiki/Using_Iptables_on_Linux
http://www.thegeekstuff.com/2011/06/iptables-rules-examples/
http://www.cyberciti.biz/faq/iptables-block-port/
http://people.redhat.com/sgrubb/files/hardening-rhel5.pdf
http://www.nsa.gov/ia/_files/factsheets/rhel5-pamphlet-i731.pdf
http://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/pdf/Security_Guide/Red_Hat_Enterprise_Linux-6-Security_Guide-en-US.pdf
http://www.tecmint.com/linux-server-hardening-security-tips/
http://www.cyberciti.biz/tips/linux-security.html
http://www.utsa.edu/oit/PDF/linuxchecklist.pdf
http://linuxlyfe.com/centos/basic-web-server-security-checklist
http://onedollardata.wordpress.com/2010/06/08/red-hat-linux-server-security-checklist/
http://www.sans.org/score/checklists/linuxchecklist.pdf
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/index.html
0
 

Author Comment

by:apunkabollywood
ID: 39841528
Thank you for your valuable suggestion but let me more specific about requirements

1-Actually it will acting as a Storage NODE and we are using EMC networker and its require root role - so i need to secure as per this so that no hacking or etc possible with proper monitoring?

2. I want to specify specific VLAN access from specific NIC card - please help me with that kind of settings?

3. SSH only allow from specific admin port not from all?

Please help me if you have more suggestions on the same
0
 

Author Closing Comment

by:apunkabollywood
ID: 39847178
Thank you - Helps me a lot
0

Featured Post

Upgrade your Question Security!

Your question, your audience. Choose who sees your identity—and your question—with question security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
This Micro Tutorial steps you through the configuration steps to configure your ESXi host Management Network settings and test the management network, ensure the host is recognized by the DNS Server, configure a new password, and the troubleshooting…
Suggested Courses
Course of the Month5 days, 11 hours left to enroll

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question