This section provides an overview of how FxM appliances manage information security.
Foglight Experience Monitor is an appliance-based solution (a rack-mounted server with pre-installed software) that plugs into the customer’s network and passively monitors TCP/IP, HTTP, HTTPS, and SOAP traffic. Users access FxM reports by connecting to the appliance through a web browser. The appliance’s software is built on top of the SUSE Linux® Enterprise Server (SLES) operating system, and includes an Apache™ Web Server, as well as specialized Quest software. FxM connects to a network tap or the diagnostic (mirror or span) port of a switch or router, allowing it to examine the customer’s network traffic of interest. It uses a separate control port for incoming connections. If the customer provides SSL-enabled services, then it has the option of installing its private SSL keys on the FxM appliance, which allows FxM to monitor SSL traffic as well.
For detailed information about the security features provided by FxM, see FxM security features.
This section describes the security features provided by FxM:
• |
A customized installation of a Linux® operating system, in which certain unused and vulnerable services have been removed (see Layer 3: Customized operating system distribution). |
FxM itself also incorporates a built-in firewall which provides additional security beyond what is provided by the network environment. This firewall was constructed using the firewall rule-set building utility Bastille-Linux® (for details, see http://bastille-linux.sourceforge.net/). The FxM firewall limits external access to the HTTP or HTTPS port, depending on how its Apache™ Web Server is configured.
If command-line access is needed for Quest technical support to run low-level diagnostic procedures, customers may optionally open the SSH port. Normally, you should keep the SSH port closed, since it should only be opened for remote diagnostic procedures. The MySQL® port may also be opened if remote database access is configured.
The firewall also includes typical checks for illegal addresses and limits ICMP usage. Opening and closing HTTPS, SSH, and MySQL® ports is the responsibility of the FxM administrators using the FxM web console.
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy