|
|
00:01 Limiting network exposure in concepts, so what do we do?
|
|
|
00:04 First of all, I said listening on the default port is just crazy
|
|
|
00:07 because people are going to be scanning that like nobody's business,
|
|
|
00:10 they may scan every port on your machine, connect to it,
|
|
|
00:13 somehow distinguish it's a MongoDB port,
|
|
|
00:15 but chances are that's not going to happen,
|
|
|
00:18 chances are people are just going to check the few ports
|
|
|
00:21 and just move on to scanning millions or billions of other ip addresses,
|
|
|
00:24 even if they do connect, we're going to have
|
|
|
00:27 some additional layers of security there,
|
|
|
00:29 hopefully the firewall makes all of this redundant.
|
|
|
00:32 But still, it's a good idea to just have layers of security
|
|
|
00:35 so here we have a port that is non default, 10001.
|
|
|
00:39 Now, we're also going to turn on our firewall
|
|
|
00:43 so in fact it's very unlikely anyone can get to that from outside of our data center
|
|
|
00:48 other than the apps or the servers that we said explicitly they can get to it.
|
|
|
00:53 So by default, deny all incoming connections, allow all outgoing connections
|
|
|
00:57 allow ssh so that we can get back in
|
|
|
01:00 or this is going to be the last time we ever see this server,
|
|
|
01:03 so we're going to allow ssh and then we're going to enable it,
|
|
|
01:06 that's the moment of truth, it says are you sure
|
|
|
01:08 I suggest doing this right away before you have lots of important data on the server.
|
|
|
01:12 And then we're also going to allow from the ip address
|
|
|
01:15 that is the application that's based upon MongoDB,
|
|
|
01:19 and then to any port this one here.
|
|
|
01:23 We've got our farewell set up, we've got MongoDB set up
|
|
|
01:26 to be non default of firewall rules, reflect that non default port.
|
|
|
01:30 So this is the web app address, this is the configured MongoDB port
|
|
|
01:36 this, we're not ready for listening on the internet yet.
|
|
|
01:40 Two more things, encryption of the connection,
|
|
|
01:43 which within the same data center may be it doesn't matter
|
|
|
01:45 but we're going to add it anyway and authentication. |