Firewall and the GUI
If firewall protection is enabled on your ACSLS server, it will impact remote user access to the ACSLS GUI unless an explicit policy is configured with the firewall software.
On Solaris
ipf and ipfilter. The ipfilter firewall is enabled (disabled) by root using the following command:svcadm enable ipfilter (svcadm disable ipfilter)
-
To learn the current status of ipfilter:
svcs ipfilter
Firewall policies can be defined in the file, /etc/ipf/ipf.conf. To allow free communication between components on the local host (such as, between ACSLS and WebLogic), include a statement, like the example below:
pass in quick from 127.0.0.1 to 127.0.0.1, or pass in quick from 127.0.0.1 to all
-
To provide a policy allowing remote Web-based browsers to access the ACSLS GUI, you must open up ports 7001 and 7002.
pass in quick from any to any port = 7001 pass in quick from any to any port = 7002
For ACSLS ACSAPI clients, you must discover which ports are in use by ACSLS. Use the following command from your UNIX shell:
rpcinfo -p | egrep "300031 | 536871166"
The port IDs are listed in the last field of the display. You must add 'pass in quick' statements for each of these. It is also be necessary to include a 'pass in quick' statement for the RPC portmapper port, 111.
For further firewall information for ACSLS, see Firewall Security Option.
The last statement in your proposed rule set, block in from any, assumes that no traffic should reach the host unless specifically allowed in previous statements.
On Linux
root,using the following command:service iptables start (service iptables stop)
-
To check the status of iptables:
service iptables status
The policy file for iptables is /etc/sysconfig/iptables.To include a policy that allows remote http/https access to the ACSLS GUI, you should update that file to include exceptions for ports 7001 and 7002, using statements like the example below:
-A input -p tcp --dport 7001 -j ACCEPT -A input -p tcp --dport 7002 -j ACCEPT
For more information on iptables, see Verifying the GUI is Operational.
rpcinfo -p | egrep "300031 | 536871166"
The port IDs are listed in the last field of the display. You must add exceptions for each of these ports in your iptables policy. It is also necessary to provide an exception statement for the RPC portmapper port, 111.
For further firewall information for ACSLS, see Firewall Security Option.
Configuring a Self-Assigned Digital Certificate for HTTPS
When you install WebLogic on your ACSLS server, a simple 512-bit public key is automatically available to support basic https exchanges with client browsers. Normally, no further configuration should be necessary. However, some browsers, notably the Microsoft Internet Explorer, require a lengthier key of no less than 1024 bits.
Internet Explorer and FireFox Version 39 and above require a WebLogic set-up procedure for use with https servers that do not employ certificates verified by a third-party digital signing authority.
Refer to "Configuring a Self-Assigned Digital Certificate for HTTPS" in the ACSLS 8.5 Installation Guide for procedures.