Security
Management router
Configure SSH server
Disable SSH access with password. Instead operators can ssh into the testbed only if their public keys are registered.
Having logged in, run the following commands to switch off password access:
configure
set service ssh disable-password-authentication
commit
save
exitTo add SSH public keys, the key must be saved in a file first, then be loaded.
vi /tmp/my_pubkey
configure
loadkey <user> /tmp/my_pubkey
commit
save
exitBring up the firewall
Follow the instructions here to establish a basic set of firewall rules: WAN_IN and WAN_LOCAL
Then, we open only SSH port on the firewall.
Use the GUI to add a new rule to the WAN_LOCAL chain. It already has:
Rule 1 - allow established and related
Rule 2 - drop invalid.
So add Rule 3 -
On the Basic pane: Enable, Action accept, Protocol tcp
On the Advanced pane: State new
On the Destination pane: Port 22
Check out the source.
Controller node
Configure SSH server
Limit SSH access only to the management network and make sure public key authentication is disabled.
Bring up the firewall
Check ufw's status
Apply the default policy firewall
Make sure the directive IPV6=yes do exists in /etc/default/ufw file. For instance:
Open and limit SSH TCP port 22 connections, HTTP, and HTTPS
Turn on firewall
Check it is up
Last updated