Security

Management router

Configure SSH server

Disable SSH access with password. Instead operators can ssh into the testbed only if their public keys are registered.

Having logged in, run the following commands to switch off password access:

configure
set service ssh disable-password-authentication
commit
save
exit

To add SSH public keys, the key must be saved in a file first, then be loaded.

vi /tmp/my_pubkey
configure
loadkey <user> /tmp/my_pubkey
commit
save
exit

Bring up the firewall

Follow the instructions here to establish a basic set of firewall rules: WAN_IN and WAN_LOCAL

Then, we open only SSH port on the firewall.

Use the GUI to add a new rule to the WAN_LOCAL chain. It already has:

  • Rule 1 - allow established and related

  • Rule 2 - drop invalid.

So add Rule 3 -

  • On the Basic pane: Enable, Action accept, Protocol tcp

  • On the Advanced pane: State new

  • On the Destination pane: Port 22

Check out the source.

Controller node

Configure SSH server

Limit SSH access only to the management network and make sure public key authentication is disabled.

Bring up the firewall

Check ufw's status

Apply the default policy firewall

Make sure the directive IPV6=yes do exists in /etc/default/ufw file. For instance:

Open and limit SSH TCP port 22 connections, HTTP, and HTTPS

Turn on firewall

Check it is up

Last updated