13 Appendix
This chapter describes the Appendix for DSR.
13.1 Secure Deployment Checklist
Enter a short description of your topic here (optional).
The following security checklist helps you secure Oracle Communications Diameter Signaling Router (DSR) and its components:
- Change default passwords
- Utilize LDAP for authentication purposes
- Utilize authorized IP addresses feature
- Use TLS or IPSEC
- Enforce strong password management
- Restrict admin functions to the required few administrator groups
- Configure community strings and traps explained in Other Optional Configurations chapter
- Restrict network access by enabling the DSR firewall feature
- Enforce iLO to use strong encryption
- Available Ciphers for SSH and HTTPS/SSL
The DSR system has been preconfigured to require modern strong ciphers for both SSH and
TLS. The supported ciphers/MACs for SSH connections
are:
Ciphers aes128-ctr,aes192-ctr,aes256-ctr
MACs hmac-sha2-512,hmac-sha2-256
This is configured in
/etc/ssh/sshd_conf
. The supported cipher set
(using openssl notation) for HTTPS/TLS
is:ECDH+AES128:ECDH+AESGCM:ECDH+AES256:DH+AES:DH+AESGCM:DH+AES256:RSA+AES:RSA+AESGCM:!aNULL:!MD5:!DSS:!SSLv3:!3DES
For the default TLS (https) connection, this is configured in
/etc/httpd/conf.d/ssl.conf
. For certificates loaded via the
GUI, this is configured in
/var/TKLK/appworks/etc/https.template
.
For detailed information on importing HTTPS or SSL Certificate into VNFM, see the DSR VNFM Installation and User Guide.