Top
PRIMECLUSTER Installation and Administration Guide4.6 Cloud Services
FUJITSU Software

14.3.2 Security Design

This section describes the security settings that are required to allow communication within the cluster.

PRIMECLUSTER uses several protocols/ports for communication within the cluster. Allow communication of protocols/ports for communication within the cluster as follows.

However, in FJcloud-Baremetal, if you allow the protocol/port used by PRIMECLUSTER, the maximum number of security rules will be exceeded. In this case, use the firewall on the OS to restrict communication.

14.3.2.1 Firewalls Applied to the Cluster Node

Refer to "Appendix K Using Firewall" in "PRIMECLUSTER Installation and Administration Guide", and set the firewall for each NIC.

In a Bare Metal environment, additional ports/protocols must be allowed.

In addition, add rules based on the security requirements of the customer.

14.3.2.2 Security Group of the Management View Client

Create the security group for the Web-Based Admin View (on the management client side) with the following values.

Inbound rule

Communication source CIDR

Protocol

Port range

Description

Specified timely

tcp

3389

Used for the remote desktop connection

Outbound rule

Communication target CIDR

Protocol

Port range

Description

IP address of the cluster node

tcp

8081

Used for the management view

IP address of the cluster node

tcp

9798

Used for the management view

IP address of the cluster node

tcp

9799

Used for the management view

14.3.2.3 Firewall Rule

When using the firewall service, add the following to the firewall rule.

Protocol

Source IP address

Destination IP address

Destination port number

Action

tcp (*1)

Subnet for the administrative LAN

Not specified

443

Allow

udp

Subnet for the administrative LAN

IP address of DNS server

53

Allow

tcp

Subnet for the administrative LAN

IP address of DNS server

53

Allow

udp

Subnet for the administrative LAN

IP address of NTP server

123

Allow

(*1) This setting is not necessary in a single-node cluster.

Note

  • Add the settings to allow the connection via ssh or the remote desktop connection from the external network as necessary.

  • When using the yum command, add the following settings. Add or delete these settings as necessary to enhance the security.

    Protocol

    Source IP address

    Destination IP address

    Destination port number

    Action

    tcp

    Subnet for the administrative LAN

    IP address to the repository server

    80

    Allow

    tcp

    Subnet for the administrative LAN

    IP address to the repository server

    443

    Allow