[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-users] Firewall rules


  • To: "Xen-users@xxxxxxxxxxxxxxxxxxx" <Xen-users@xxxxxxxxxxxxxxxxxxx>
  • From: Nathan Eisenberg <nathan@xxxxxxxxxxxxxxxx>
  • Date: Tue, 24 Aug 2010 22:05:58 +0000
  • Accept-language: en-US
  • Cc:
  • Delivery-date: Tue, 24 Aug 2010 15:07:40 -0700
  • Domainkey-signature: a=rsa-sha1; s=key2; d=atlasnetworks.us; c=nofws; q=dns; h=from:message-id; b=JHDZRoAB/yEXyqatHJhnVT6ozY3sHLAaA1uddHiWiTFOEJPr6IM8P3jAT/Up VoRcqHHWTvbLNxj3iN5nZgPOgo7Eex1uH7QcJ5JrWpcpsB163ucg6IWVG pJ/JjBGW1H86gIerm0MBu6ucTetoaPKUSAnCOnb0tZvKOR8qD01WCc=;
  • List-id: Xen user discussion <xen-users.lists.xensource.com>
  • Thread-index: AQHLQ9DfLqIcHXlumU6pNoW95CJKgZLxJwhA
  • Thread-topic: [Xen-users] Firewall rules

> Hi Everyone,
> 
> For all the folk here on this list that offer VPS hosting, do you guys just 
> give a
> VPS to a customer in a non-firewalled state?
> 
> Cheers
> 

It's not really specific to XEN, but at $datacenterjob, we deploy servers with 
the host firewall blocking everything except for ICMP-PING, and SSH or RDP.  
Typically, fail2ban is also installed on linux servers to kill off the lazy 
bruteforcers.  Lastly, we drop the netbios ports using ACLs at our border 
routers.


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.