◦ Never let someone who does not have access rights to the controller ‘look over your
shoulder’ while accessing the UI.
◦ Make sure Keystone is configured to expire tokens after a short period of time (a common
industry practice is 20 minutes).
• Do not delete any iptables with the name hazelcast, cassandra-default, or
cassadra-team, or any rules with the following ports: 5700, 7000, 7001, 7199, 9160.
• Do not manually override the iptables rules to allow or deny ports 5700, 7000, 7001, 7199,
and 9160.
Example 1 “Rules created for a team of 3 controllers” displays the rules created for a team of 3
controllers (1.2.1.1, 1.2.1.2, 1.2.1.3) when running the sudo iptables -nL command:
Example 1 Rules created for a team of 3 controllers
# sudo iptables -nL
Chain INPUT (policy ACCEPT)
target prot opt source destination
cassandra-team all -- 0.0.0.0/0 0.0.0.0/0
cassandra-default all -- 0.0.0.0/0 0.0.0.0/0
hazelcast all -- 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
cassandra-team all -- 0.0.0.0/0 0.0.0.0/0
cassandra-default all -- 0.0.0.0/0 0.0.0.0/0
hazelcast all -- 0.0.0.0/0 0.0.0.0/0
Chain cassandra-default (2 references)
target prot opt source destination
ACCEPT tcp -- 127.0.0.1 127.0.0.1 tcp dpt:7001
ACCEPT tcp -- 127.0.0.1 127.0.0.1 tcp dpt:9160
ACCEPT tcp -- 127.0.0.1 127.0.0.1 tcp dpt:7199
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7199
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9160
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7000
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7001
Chain cassandra-team (2 references)
target prot opt source destination
ACCEPT tcp -- 1.2.1.2 1.2.1.3 tcp dpt:7001
ACCEPT tcp -- 1.2.1.3 1.2.1.2 tcp dpt:7001
ACCEPT tcp -- 1.2.1.1 1.2.1.3 tcp dpt:7001
ACCEPT tcp -- 1.2.1.3 1.2.1.1 tcp dpt:7001
ACCEPT tcp -- 1.2.1.3 1.2.1.3 tcp dpt:7001
Chain hazelcast (2 references)
target prot opt source destination
ACCEPT tcp -- 1.2.1.2 1.2.1.3 tcp dpt:5700
ACCEPT tcp -- 1.2.1.3 1.2.1.2 tcp dpt:5700
ACCEPT tcp -- 1.2.1.1 1.2.1.3 tcp dpt:5700
ACCEPT tcp -- 1.2.1.3 1.2.1.1 tcp dpt:5700
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5700
Security best practices 127