Accept only what you need (ports incoming/outgoing) for specific trusted clients. Decide for protocols such as ICMP, DNS, NTP, SSH and of course HTTP and drop all other coming in and reject going out. Beyond this you can also configure some protection for bad packets.

There are plenty of guides and examples to learn from.

But i would like to add that it's a good idea to set up a cron script that disables the firewall rules in case you lock yourself out, it will happen!

On Tue, 10 Apr 2012 08:54:00 -0700 (PDT), Spadez <james_will...@hotmail.com> wrote:
Thank you for the reply. I hate to take more of peoples time but can anyone
elaborate more on the kind of firewall rules I should be looking at?

--
View this message in context:

http://lucene.472066.n3.nabble.com/Securing-Solr-under-Tomcat-IP-best-way-tp3899929p3900040.html
Sent from the Solr - User mailing list archive at Nabble.com.

--

Reply via email to