120
BCC 1.1 SP2: Administration Guide for NetWare 6.5 SP8
no
vd
ocx
(e
n)
13
Ma
y 20
09
The changes do not take effect until either a reboot of each cluster node, or a restart of the Business
Continuity Clustering software on each cluster node.
The following table provides an example of possible combinations of scheme and port specifier for
the
<address>
tag for values of the NCS:BCC Peers attribute:
Table 10-4
Example of Scheme and Port Specifier Values for the NCS:BCC Peers Attribute
10.3 General Security Guidelines
Servers should be kept in a physically secure location with access by authorized personnel only.
The corporate network should be physically secured against eavesdropping or packet sniffing.
Any packets associated with the administration of BCC should be the most secured.
Access to BCC configuration settings and logs should be restricted. This includes file system
access rights, FTP access, access via Web utilities, SSH, and any other type of access to these
files.
Services that are used to send BCC data to other servers or e-mail accounts or that protect BCC
data should be examined periodically to ensure that they have not been tampered with.
When synchronizing cluster or user information between servers outside the corporate firewall,
the HTTPS protocol should be employed. Because resource script information is passed
between clusters, strong security precautions should be taken.
When a BCC is administered by users outside of the corporate firewall, the HTTPS protocol
should be used. A VPN should also be employed.
If a server is accessible from outside the corporate network, a local server firewall should be
employed to prevent direct access by a would-be intruder.
Audit logs should be kept and analyzed periodically.
10.4 Security Information for Dependent
Products
The following table provides links to security-related information for other products that impact the
security of BCC:
Value
Protocol Used
Port Used
10.1.1.10
HTTPS
5989
10.1.1.10:1234
HTTPS
1234
http://10.1.1.10
HTTP
5988
http://10.1.1.10:1234
HTTP
1234
Summary of Contents for BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION
Page 4: ...4 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 10: ...10 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 26: ...26 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 36: ...36 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 54: ...54 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 82: ...82 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 92: ...92 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 122: ...122 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Page 126: ...126 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...