{"id":1896,"date":"2012-02-18T09:38:15","date_gmt":"2012-02-18T14:38:15","guid":{"rendered":"http:\/\/appcrawler.com\/wordpress\/?p=1896"},"modified":"2012-02-18T10:53:16","modified_gmt":"2012-02-18T15:53:16","slug":"linux-firewall-rules-for-rac","status":"publish","type":"post","link":"http:\/\/appcrawler.com\/wordpress\/2012\/02\/18\/linux-firewall-rules-for-rac\/","title":{"rendered":"Linux firewall rules for RAC"},"content":{"rendered":"<p>Most notes on the Oracle MOS support site suggest disabling the firewall supplied in most Linux distros as managed by the iptables program.  I think this is a bit drastic, and results in lazy thinking at best, and an exposed database server subject to all sorts of hacker invasion at worst.<\/p>\n<p>If you don&#8217;t want to understand every nuance of Linux firewalls, but do want to at least not completely disable it, the easiest fix is to add a simple rule to your iptables configuration on each server in the cluster.<\/p>\n<p>As root:<\/p>\n<pre lang=\"text\">\r\nvi \/etc\/sysconfig\/iptables\r\n<\/pre>\n<p>add the following line before any REJECT rules, changing eth1 to whatever your private interface is<\/p>\n<pre lang=\"text\">\r\n-A RH-Firewall-1-INPUT -p udp -i eth1 -j ACCEPT\r\n<\/pre>\n<p>Restart the firewall<\/p>\n<pre lang=\"text\">\r\nservice iptables restart\r\niptables -nvL\r\n<\/pre>\n<p>You should see a line with increasing packet activity for the UDP protocol on your private network interface.<\/p>\n<p>This leaves all other firewall rules in place, and allows only UDP traffic on the private interface.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most notes on the Oracle MOS support site suggest disabling the firewall supplied in most Linux distros as managed by the iptables program. I think this is a bit drastic, and results in lazy thinking at best, and an exposed&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"http:\/\/appcrawler.com\/wordpress\/2012\/02\/18\/linux-firewall-rules-for-rac\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[19,22,32],"tags":[],"_links":{"self":[{"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/posts\/1896"}],"collection":[{"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/comments?post=1896"}],"version-history":[{"count":5,"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/posts\/1896\/revisions"}],"predecessor-version":[{"id":1901,"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/posts\/1896\/revisions\/1901"}],"wp:attachment":[{"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/media?parent=1896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/categories?post=1896"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/appcrawler.com\/wordpress\/wp-json\/wp\/v2\/tags?post=1896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}