Accept only what you need (ports incoming/outgoing) for specific
trusted clients. Decide for protocols such as ICMP, DNS, NTP, SSH and of
course HTTP and drop all other coming in and reject going out. Beyond
this you can also configure some protection for bad packets.
There are plenty of guides and examples to learn from.
But i would like to add that it's a good idea to set up a cron script
that disables the firewall rules in case you lock yourself out, it will
happen!
On Tue, 10 Apr 2012 08:54:00 -0700 (PDT), Spadez
<james_will...@hotmail.com> wrote:
Thank you for the reply. I hate to take more of peoples time but can
anyone
elaborate more on the kind of firewall rules I should be looking at?
--
View this message in context:
http://lucene.472066.n3.nabble.com/Securing-Solr-under-Tomcat-IP-best-way-tp3899929p3900040.html
Sent from the Solr - User mailing list archive at Nabble.com.
--