EasyManua.ls Logo

EndRun Sonoma D12 - Page Descriptions

EndRun Sonoma D12
172 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
S o n o m a U s e r M a n u a l
42
C H A P T E R F I V E
43
S o n o m a U s e r M a n u a l
S E C U R I T Y
Direct root logins are only permitted on the local RS-232 console or via SSH.
The secure copy utility, scp, eliminates the need to use the insecure FTP protocol for transferring
program updates to the Sonoma.
ΗTTP access for system monitoring only, is allowed only via SSL, so passwords and session data
are encrypted on the wire. Access via HTTPS may be restricted or completely disabled. See Restrict
Access - HTTPS and Disable SNMP, SSH and HTTPS below.
SNMP access for system monitoring only, is congurable to provide the security of the latest ver-
sion 3 Internet standard which supports both view-based access control and user-based security using
modern encryption techniques. Previous versions v1 and v2c supported access control essentially
via passwords transmitted over the network in plain text. Refer to Chapter 6 - SNMP and Restrict
Access - Telnet, SSH and SNMP (below) for details. SNMP may also be completely disabled. See
Disable SNMP, SSH and HTTPS below.
Individual host access to protocol server daemons in.telnetd, snmpd or sshd are controlled by
directives contained in the les /etc/hosts.allow and /etc/hosts.deny, which are congured using the
interactive script accessconfig. See Restrict Access - Telnet, SSH and SNMP below.
Insecure protocols like Time, Daytime and Telnet may be completely disabled by conguration of
the inetd super-server daemon using the interactive script inetdconfig. See Disable Telnet, Time
and Daytime below.
Restrict Access
The following paragraphs describe how to restrict SNMP, SSH, Telnet and HTTPS access to specic
hosts. Also described is how to restrict NTP query access.
Restrict Access - Telnet, SSH and SNMP
By default, the Sonoma is congured to allow access by all users via Telnet, SSH and SNMP. To
ensure security and to protect against denial-of-service attacks, you should restrict access by using the
accessconfig command.
accessconfig modies two les, /etc/hosts.allow and /etc/hosts/deny, which are used by tcpd and
the standalone daemons, snmpd and sshd, to determine whether or not to grant access to a request-
ing host. These two les may contain conguration information for a number of protocol servers, but
in the Sonoma only access control to the protocol server daemons in.telnetd, sshd and snmpd is
congured.
As shipped from the factory, these two les are empty. When you run accessconfig, these lines
are added to the /etc/hosts.deny le:
in.telnetd: ALL
sshd: ALL
snmpd: ALL

Table of Contents

Related product manuals