Many network intruders begin an attack by scanning the target network. Detection of such a scan offers one indication that an attack is about to begin. FxM attempts to detect such scans by watching for access to ports that are not active on the appliance system, but are typically exploited by hackers (for example, FTP, POP3, IMAP). Upon detection, the FxM system automatically adds the source IP address of the potential attacker to the firewall rule-set and blocks all future packets that appear to originate from that address. This functionality is implemented using the Port Sentry tool (for details, see http://sourceforge.net/projects/sentrytools).
• |
FxM bundles the 64-bit SUSE Linux® Enterprise Server 11 SP4 operating system. |
• |
Many tools and packages that represent common vulnerabilities are stripped out of the distribution. For example, Telnet, FTP server, rlogin, NFS, Samba, and lpr are not installed on the appliance. |
• |
Access to potentially exploitable tools needed by FxM to operate (such as ping and traceroute) has been severely restricted. |
• |
All standard Linux® user accounts available on the appliance (that is, shutdown, halt, mailnull, etc.) have no login shell that would allow an attacker to enter shell commands. Only user accounts with “Terminal access enabled” have a login shell. The shell can only be accessed through the terminal or SSH. The password for a user account is specified by the FxM user, and must be a strong password in order to enable SSH access. |
This section presents the mechanisms used to authenticate FxM users (see FxM user authentication) and Foglight Experience Monitor users drilling down in to the FxM appliance (see Foglight user authentication). It also presents the privileges associated with different types of user accounts (see User authorization and privileges), and provides information about strong passwords (see Strong passwords).
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center