Setting up Security
With Continentalclusters version prior to A.08.00, setting up security involves preparing the security files, and ensuring that the network security requirements are met. Starting with Continentalclusters A.08.00, a secure communication using SSH must be set up for
Issue the following command to retrieve the Continentalclusters version from a node:
swlist
ContClusters A.08.00.00. The Continentalclusters SD product for Disaster Recovery
Following topics are discussed in this section:
•“Setting up Security with versions prior than A.08.00” (page 59)
•“Setting up Security with Continentalclusters Version A.08.00” (page 60)
Setting up Security with versions prior than A.08.00
Preparing Security Files
Running a Continentalclusters command requires root access to cluster information on all the nodes of the participating Serviceguard clusters in the configuration. Before doing the Continentalclusters configuration, edit the /etc/cmcluster/cmclnodelist file on each node of all the participating clusters to include entries that will allow access by all nodes in the Continentalclusters. Here is a sample entry in the /etc/cmcluster/cmclnodelist file for Continentalclusters configured with two,
lanode1.myco.com root
lanode2.myco.com root
nynode1.myco.com root
nynode2.myco.com root
Also, be sure to create the /etc/opt/cmom/cmomhosts file on all nodes. This file allows nodes that are running monitor packages and Continentalclusters commands to obtain information from other nodes about the health of each cluster. The file must contain entries that allow access to all nodes in the Continentalclusters by the nodes where monitors and Continentalclusters commands are running.
Define the order of security checking by creating entries of the following types:
order deny,allow | If deny is first, the deny list is checked first to see if the node is there, | |
| then the allow list is checked. | |
deny from | lists all the nodes that are denied access. Permissible entries are: | |
| all | All hosts are denied access. |
| domain | Hosts whose names match, or end in, this string |
|
| are denied access, for example, hp.com. |
| hostname | The named host (for example, kitcat.myco.com) |
|
| is denied access. |
| IP address | Either a full IP address, or a partial IP address |
|
| of 1 to 3 bytes for subnet restriction is denied. |
| network/netmask | This pair of addresses allows more precise |
|
| restriction of hosts, (for example, |
|
| 10.163.121.23/225.225.0.0). |
| network/nnnCIDR | This specification is like the network/netmask |
|
| specification, except the netmask consists of |
|
| nnn |
|
| Classless Interdomain Routing, a type of routing |
Building the Continentalclusters Configuration | 59 |