한국어

네트워킹

온누리070 플레이스토어 다운로드
    acrobits softphone
     온누리 070 카카오 프러스 친구추가온누리 070 카카오 프러스 친구추가친추
     카카오톡 채팅 상담 카카오톡 채팅 상담카톡
    
     라인상담
     라인으로 공유

     페북공유

   ◎위챗 : speedseoul


  
     PAYPAL
     
     PRICE
     

pixel.gif

    before pay call 0088 from app


http://www.datastax.com/support-forums/topic/iptables-rules-for-datastax-enterprise




There is no official guide on how to configure iptables with DSE...mostly because there is no one way to do it. There are several different ports that are used for different purposes. Some absolutely must be opened in firewall for internode communication, others are optional depending on the tools that you want to use and from where. I'm afraid that the document you quoted is a little too harsh in its wording on requiring all of those ports open for Cassandra to function.

Note: all the ports listed below are TCP ports.

For internode communication:

You must have port 7000 open between all nodes.

Other ports:

7199, 1024+ (the most annoying line for any firewall admin) - These ports are used to open a JMX connection to the cassandra node. So, if you want to use a JMX client to connect to a cassandra node, you need to open these ports for the source IP address of the machine the client is running on. Examples of JMX clients are: JConsole and nodetool. You could have one trusted machine which you run these commands from and have all of the cassandra nodes open these TCP ports to *only* this trusted machine (or small set of machines).

9160 - This is the thrift client port. It is used by utilities like cqlsh, the cassandra-jdbc driver, pycassa and other thrift clients. This port will have to be opened for communications between machines these clients are operating on and the cassandra nodes.

About how to configure iptables. Here is what I usually do (it may or may not work for your level of paranoia, but it will give you a start):

So, first, a bit on TCP and UDP communications: UDP messages are stateless and do not require any set up of a connection before sending a message. TCP on the other hand are stateful. A connection must be set up before any messages containing data are accepted (by the machine's kernel). So, when setting up a firewall for TCP connections, if you do not let the message that sets up the connection through the firewall, you are effectively disallowing any data packets to the port in question. The packet that sets up the connection is a TCP packet with the SYN bit set, and the ACK, RST, and FIN bits cleared. This packet needs to be stopped in order to stop a connection from being set up. So, for TCP, I usually allow all packets except for ones with the SYN bit set (and ACK, RST, and FIN cleared) whose destination port is not to be opened.

Another note. iptables has several tables and chains in these tables. We will be modifying the default table of: filter and chain: INPUT.

For example to close all ports except for SSH (port 22) to the machine from anywhere, you can use the following rules:

iptables --append INPUT --proto tcp --destination-port 22 --syn -j ACCEPT
iptables --append INPUT --proto tcp --syn -j DROP

It creates the following rules:

# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:sshflags: FIN,SYN,RST,ACK/SYN
DROP       tcp  --  anywhere             anywhere             tcpflags: FIN,SYN,RST,ACK/SYN

Note, the default policy is still ACCEPT. This means accept all packets for already connected TCP connections, and drop all new connection requests except for to port 22 from any source IP address. You could also specify a source IP address in your iptables rule to open port 22 (in order to make it more restrictive):

iptables --append INPUT --proto tcp --destination-port 22 --source address[/mask][,...] --syn -j ACCEPT

So, for cassandra, you need to open 7000 on each cassandra node to other nodes in the cluster. You can specify the source by individual machines or by a whole subnet.

조회 수 :
82218
등록일 :
2014.02.26
15:33:32 (*.251.139.148)
엮인글 :
http://www.webs.co.kr/index.php?document_srl=38852&act=trackback&key=bfa
게시글 주소 :
http://www.webs.co.kr/index.php?document_srl=38852
List of Articles
번호 제목 글쓴이 조회 수 추천 수 날짜sort
33 tar로 전체시스템 백업 LINUX Backup admin 210171   2013-04-04
 
32 다운된 리눅스서버 응급복구 admin 83738   2013-03-28
 
31 Build a RADIUS server on Linux admin 94339   2013-03-23
 
30 Deploying FreeRADIUS with the MySQL Cluster Database file admin 37592   2013-03-22
 
29 FREE RADIUS 활용및 응용 admin 48634   2013-02-23
 
28 리눅스에 RADIUS 서버 구현하기 admin 227461   2012-09-01
 
27 Debian CD DVD 다운로드 링크 헤메지말고 바로 다운로드하지요 admin 39530   2012-08-18
 
26 Site builder shootout: Drupal vs. Joomla vs. WordPress admin 147409   2012-07-15
 
25 WinXP 부팅안되는 현상 NTLDR is missing 메세지 admin 36880   2012-07-12
 
24 윈도우XP 알면 정말 편한 숨겨진 기능 60가지 admin 87091   2012-05-11
 
23 한국인/국내기업은 얼마나 Linux Kernel에 기여할까? admin 77890   2012-04-29
 
22 scp, ssh, rsync등을 사용할때에 SSH 비밀번호 묻는것 피하기 admin 41624   2012-04-15
 
21 [Linux/SSL] 리눅스 서버에 Apache 2 설치 및 SSL 설정하기(mod_ssl, openssl) admin 42923   2012-04-15
 
20 리눅스의 막강한 네트워크 필터 iptables admin 32063   2012-04-15
 
19 Centos net install web http admin 82676   2012-03-02
 
18 Linux 시스템 백업과 복원 admin 78242   2012-02-28
 
17 검색 파일리스트 만든 다음 여러파일 한방에 압축하기 admin 33573   2012-02-14
 
16 linux 파티션 디렉토리 용량 확인방법 전체 폴더 크기 사이즈 admin 41188   2012-01-05
 
15 How to disable IPv6 in Debian Lenny and Squeeze admin 45713   2011-12-29
 
14 리눅스 네트워크 설정 LINUX admin 42155   2011-12-19
 
13 다양한 사운드 파일있는곳 admin 30596   2011-12-19
 
12 모든 CPU 벤치마크 수치 admin 41475   2011-12-16
 
11 Wireshark admin 30730   2011-12-16
 
10 스트리밍서버 / 윈도우서버 admin 38159   2011-12-16
 
9 무료백신 여러가지 분류해놓은곳 admin 31005   2011-12-16
 
8 윈도우 2003 작업 스케줄러 설정 admin 47917   2011-12-16
 
7 파이썬 설치 및 사용하기 admin 109657   2011-12-16
 
6 How to disable IPv6 in Debian , 리눅스 아이피설정 admin 45577   2011-12-16
 
5 리눅스 서버 이전시 고려할 사항들 admin 131498   2011-12-16
 
4 ftp 파일전송 여러파일을 한번에 통째로 전송 admin 38263   2011-12-16