
81
Chapter 11
Security Options
Controlling client access to the Traffic Server proxy cache
You can configure Traffic Server to allow only certain clients to use the proxy cache.
To specify the clients allowed to use Traffic Server as a proxy cache:
1. Telnet into the HP web cache appliance and select Shell Access as described in
Overview of Access
Methods‚ on page 7
.
2. Open the
ip_allow.config
file located in Traffic Server’s
config
directory with Vi.
By default, the file contains the following line that allows all clients to access the Traffic Server proxy
cache:
src_ip=0.0.0.0-255.255.555.255
action=ip_allow
3. Comment out the default line, as shown below.
#src_ip=0.0.0.0-255.255.555.255
action=ip_allow
4. Using the following format, add a line for each IP address or range of IP addresses allowed to access
Traffic Server:
src_ip=IP address or range of IP addressses
action=ip_allow
where
IP address or range of IP addresses
is the IP address or range of IP addresses of the
clients that are allowed to access the Traffic Server proxy cache.
For example, to allow client access from a host with the IP address 11.11.11.1 and from a host with the IP
address 1.1.1.1, enter the following lines in the file:
src_ip=11.11.11.1
action=ip_allow
src_ip=1.1.1.1
action=ip_allow
5. Save and close the
ip_allow.config
file.
6. Run the command
traffic_line -x
to apply the configuration changes.
Controlling host access to the Traffic Server machine (ARM
security)
For security reasons, you might want to restrict the type of communication possible with machines running
Traffic Server. Using Traffic Server’s ARM security option, you can create an access control list that is used
to either allow or deny other hosts from communicating with the Traffic Server machine on specific ports. This
firewall prevents potentially malicious packets from disrupting the operation of the machine.
When the ARM security option is enabled, the Traffic Server ARM examines UDP and TCP packets as they
arrive at the Traffic Server machine and matches them against the access control list that you specify in a
configuration file. The ARM checks all UDP packets (since UDP communication is, by definition,
connectionless) and looks at the first TCP packet initiating the session against the configuration file access
control list. Acceptable packets using either protocol are then passed up the network stack. Only incoming
UDP and TCP packets are affected. This means that it is always possible to initiate TCP and UDP connections
from Traffic Server regardless of the access control list configured.
NOTE
If an unauthorized client tries to access Traffic Server, a message displays in their
browser indicating that the requested content cannot be obtained. For example, in
Netscape Version 4.7, the message The document contained no data appears in the
browser window. In Internet Explorer Version 5.0, the message The page cannot be
displayed appears in the browser window.