Security best practices

Observing these rules can help to prevent unauthorized access to the controller:

IP tables Rules

Target

prot opt source

Destination

REJECT

tcp --anywhere

anywhere tcp dpt:5700 reject-with icmp-port-unreachable

ACCEPT

tcp – 127.0.0.0/8

anywhere tcp dpt:9160

REJECT

tcp --anywhere

anywhere tcp dpt:9160 reject-with icmp-port-unreachable

ACCEPT

tcp – 127.0.0.0/8

anywhere tcp dpt:7199

REJECT

tcp --anywhere

anywhere tcp dpt:7199 reject-with icmp-port-unreachable