Firewall:port assigment, Port security – HP UX B6941-90001 User Manual
Page 443
Chapter 10
443
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
example, if the ITO management server ‘garlic.spices.com’ and the
managed node ‘
basil.herbs.com
’ are configured to run with
authenticated RPCs the following principals will be created:
❏
opc/opc-mgr/garlic.spices.com
❏
opc/opc-agt/basil.herbs.com
In DCE, a name or principal (
garlic.spices.com
) belongs to a group
(
opc-mgr
), which in turn belongs to an organization (
opc
). The only
exception to this rule in ITO is the principal
opc-agt-adm
:
opc-agt-adm
is a member of the group and organization
none
, which is
a special principal that is primarily used in the administration of
accounts and passwords.
In addition, ITO allows you to select and configure the security level your
particular environment requires for an individual managed node: the
value is stored in the given managed node’s nodeinfo file and on the
management server in the relevant entry in the database. In this way,
security on a given managed node may be changed to handle, for
example, the addition of sensitive connections.
ITO may be configured in such a way as to be able to overcome a
situation where, owing to the temporary unavailability or poor
configuration of the security service, a process is required to run in
unauthenticated mode or fail. For example, if a management server
process such as the request sender receives an authentication failure
when calling a control agent on a managed node, an error message is
generated, which appears in the
Message Browser
window. The
administrator is then able to take immediate corrective action, for
example, by temporarily changing the security level on the managed
node in question to allow the retransmitted request to succeed. However,
care should be taken in situations such as this, since an error in the
connection could in certain circumstances indicate that the system is
under “attack”.
Port Security
One simple but effective way of limiting access to a network and
consequently improving the network’s inherent security is to restrict to a
specific range of ports all connections between processes. This applies to
all network traffic and not just RPCs. In the context of ITO, you can do
this on two distinct levels: