Administer > Security Configuration > Restrict Remote Access to the NPS Databases

Restrict Remote Access to the NPS Databases

Note Follow the instructions in this section only if NNMi and NPS are installed on the same server.

NPS uses an embedded database to store the performance data collected by NNMi and iSPIs for building reports. NPS uses another database, known as the Content Store, to store and maintain all the details of Extension Packs and reports. This procedure enables you to prevent remote systems to access these two databases.

The NPS databases use the following ports:

  • 9301
  • 9303
  • 9306

This procedure helps you configure the firewall running on the NNMi management server to block communication through these ports.

To restrict remote access to the embedded NPS data store:

On Windows:

Use the Windows Firewall program to block remote communication though the 9303 and 9306 ports. For more information, see the Microsoft Windows documentation.

On Linux:

  1. Log on to the NNMi management server as root.
  2. Run the following commands:

    1. service iptables start

    2. iptables -A INPUT -p tcp -i eth+ --dport 9303 -j REJECT

    3. iptables -A INPUT -p tcp -i eth+ --dport 9306 -j REJECT

    4. service iptables save

To restrict remote access to the Content Store:

  1. Log on to the NNMi management server as root or administrator.
  2. Open the following file with a text editor:

    • On Windows: %nnminstalldir%\nonOV\sybasease\interface
    • On Linux: /opt/OV/nonOV/sybasease/interfaces
  3. Make sure the following lines do not contain any external IP address or hostnames:

    ASECONTENTSERVER  
      master tcp ether 127.0.0.1 9301
      query tcp ether 127.0.0.1 9301
    ASECONTENTSERVER_BS  
      master tcp ether localhost 9308
      query tcp ether localhost 9308