Go to main content
Oracle MiniCluster S7-2 보안 설명서

인쇄 보기 종료

업데이트 날짜: 2016년 10월
 
 

호스트 기반 방화벽 규칙 확인

전역 영역, 커널 영역, 비전역 영역을 포함한 모든 컴퓨트 환경은 IPFilter 방화벽으로 자동으로 구성됩니다. 수동 작업은 필요하지 않습니다.

사용 중인 IPFilter를 확인하려면 다음 단계를 수행합니다.

  1. 노드 1에서 전역 영역에 mcinstall로 로그인하고 root 역할을 맡습니다.

    Oracle ILOM 로그인 지침은 Oracle MiniCluster S7-2 Administration Guide를 참조하십시오.

    % ssh mcinstall@mc4-n1
    Password: ***************
    Last login: Tue Jun 28 10:47:38 2016 on rad/59
    Oracle Corporation      SunOS 5.11      11.3    June 2016
    Minicluster Setup successfully configured
    Unauthorized modification of this system configuration strictly prohibited
    mcinstall@mc4-n1:/var/home/mcinstall % su root
    Password: ***************
    #
    
  2. IPFilter 구성을 확인합니다.

    /etc/ipf/ipf.conf 파일의 규칙이 다음 화면 출력과 일치하는지 확인합니다.

    # cat /etc/ipf/ipf.conf
    block in log on all
    block out log on ipmppub0 all
    pass in quick on ipmppub0 proto tcp from any to any port = 22 flags S keep state
    pass out quick on ipmppub0 proto tcp from any to any port = 22 flags S keep state
    pass in quick on ipmppub0 proto tcp from any to any port = 111 flags S keep state
    pass out quick on ipmppub0 proto tcp from any to any port = 111 flags S keep state
    pass in quick on ipmppub0 proto tcp from any to any port = 443 flags S keep state
    pass in quick on ipmppub0 proto tcp from any to any port = 1159 flags S keep state
    pass in quick on ipmppub0 proto tcp from any to any port = 1158 flags S keep state
    pass in quick on ipmppub0 proto tcp from any to any port 5499 >< 5550 flags S keep state
    pass in quick on ipmppub0 proto tcp from any to any port = 4900 flags S keep state
    pass out quick on ipmppub0 proto tcp from any to any port = 4900 flags S keep state
    pass out quick on ipmppub0 proto tcp from any to any port = 1522 flags S keep state
    pass out quick on ipmppub0 proto tcp from any to any port = 1523 flags S keep state
    pass in quick on ipmppub0 proto tcp from any to any port = 2049 flags S keep state
    pass out quick on ipmppub0 proto tcp from any to any port = 2049 flags S keep state
    pass out quick on ipmppub0 proto tcp/udp from any to any port = domain keep state
    pass in quick on ipmppub0 proto icmp icmp-type echo keep state
    pass out quick on ipmppub0 proto icmp icmp-type echo keep state
    pass in quick on ipmppub0 proto udp from any to any port = 123 keep state
    pass out quick on ipmppub0 proto udp from any to any port = 123 keep state
    block return-icmp in proto udp all
    
  3. IPF 서비스가 온라인 상태인지 확인합니다.
    # svcs | grep svc:/network/ipfilter:default
    online         22:13:55 svc:/network/ipfilter:default
    # ipfstat -v
    bad packets:            in 0    out 0
     IPv6 packets:          in 0 out 0
     input packets:         blocked 2767 passed 884831 nomatch 884798 counted 0 short 0
    output packets:         blocked 0 passed 596143 nomatch 595516 counted 0 short 0
     input packets logged:  blocked 0 passed 0
    output packets logged:  blocked 0 passed 0
     packets logged:        input 0 output 0
     log failures:          input 0 output 0
    fragment state(in):     kept 0  lost 0  not fragmented 0
    fragment reassembly(in):        bad v6 hdr 0     bad v6 ehdr 0  failed reassembly 0
    fragment state(out):    kept 0  lost 0  not fragmented 0
    packet state(in):       kept 0  lost 0
    packet state(out):      kept 0  lost 0
    ICMP replies:   0       TCP RSTs sent:  0
    Invalid source(in):     0
    Result cache hits(in):  0       (out):  0
    IN Pullups succeeded:   0       failed: 3462
    OUT Pullups succeeded:  0       failed: 0
    Fastroute successes:    0       failures:       0
    TCP cksum fails(in):    0       (out):  0
    IPF Ticks:      92894
    Packet log flags set: (0)
            none
    
  4. 방화벽 규칙을 변경하지 않아도 데이터베이스 및 애플리케이션에 액세스할 수 있는지 확인합니다.