System Security

This chapter covers important aspects of running your Traffic Manager software in a secure environment. The points in this chapter that consider operating system configuration apply only to the Traffic Manager software variant, and not to appliance or cloud variants.

Firewall and Operating System Settings

The Traffic Manager is not a network-level firewall and it is highly recommended that any Traffic Manager system is placed behind a firewall of your choosing. There are extra measures that can be taken to reduce potential security problems related to your choice of operating system, and UNIX security in general. These are discussed briefly below.

ATTENTION
The notes that follow are brief and deal specifically with the Traffic Manager product line. Customers are advised to take extra care over all security considerations related to Internet service providing, and to seek specialized advice if required.

Firewalling Techniques

The Traffic Manager must be able to respond to requests, and certain protocols (such as FTP) may need to open additional connections with clients. Stateful firewalls can be configured to allow outgoing connections to be established from the Traffic Manager on any port, and for subsequent responses from clients to be allowed back to the server.

The recommended firewall configuration for the Traffic Manager is therefore a stateful firewall that denies all inbound traffic by default, allowing named ports on the Traffic Manager to be contacted and any responses to the Traffic Manager to be allowed through the firewall.

Default Ports Used by the Traffic Manager

The Traffic Manager requires some ports and protocols in addition to those used by the virtual servers configured. These are:

The Admin Server port (HTTPS): By default, this is port 9090 (TCP and UDP). Use this port, together with the host name or IP address, to browse to the Admin UI. This port must be open to any device from which you want to access the Admin UI, including all other Traffic Managers in your cluster. This port is additionally used by the Traffic Manager’s SOAP-based Control API and Command-line Interface (CLI).

For Traffic Manager appliance/virtual appliance/cloud instance variants, the current value of the Admin Server port is displayed on the console. For software variants, read the configuration file ZEUSHOME/admin/website. The absence of an entry in this file means that the Admin Server port is the default 9090.

The control port: By default, this is TCP port 9080. The Traffic Manager uses this port for the control protocol to communicate changes in configuration data between Traffic Managers. This port does not need to be exposed outside the cluster.

To learn the current value of the control port, read the configuration file ZEUSHOME/zxtm/global.cfg. The absence of a entry in this file means that the control port is the default 9080.

The REST API port: By default, this is TCP port 9070. The REST API is an alternative programmatic method of configuring the Traffic Manager. For more information, see the Pulse Secure Virtual Traffic Manager: REST API Guide available from the Ivanti Web site, at www.ivanti.com.

To learn the current value of the REST API port, click System > Security > REST API in the Admin UI and observe the value set in rest!port.

During initial configuration, if the Traffic Manager determines that any of the default ports are unavailable, the affected port number is incremented by 1 until the Traffic Manager detects a free port. Thus, in this scenario you might find that your Admin Server port is set to 9091, 9092, or higher. This is equivalently true for the Control port (8081 or higher) or the REST API port (9071 or higher).

ATTENTION
All references to port values shown throughout this guide and all other Traffic Manager user documentation should be read to mean the default value shown here or whatever value has been set/chosen in its place.

The Admin Server and REST API ports can be user-redefined as required on the System > Security page of the Traffic Manager Admin UI. You should then update your firewall rules accordingly.

The Traffic Manager also uses broadcasts to identify other Traffic Managers. These broadcasts are sent to the multicast address, 239.100.1.1 on port 9090 (or alternative). All Traffic Manager cluster members listen on this address. To modify the broadcast IP address and port, use the settings in System > Fault Tolerance.

If you have configured each Traffic Manager in your cluster to use a dedicated Management Network as described in Dedicated Management Network, this management traffic will be restricted to that network alone. It should not be possible to connect to any of the Traffic Manager management ports from another network. Nevertheless, you should still firewall these ports off from untrusted sources, for example, in the event that a configuration error relaxes the Traffic Manager’s management restrictions, or the management network is accidentally exposed.

Traffic Manager virtual appliances and cloud instances run a local NTP service that listens for NTP (time) requests on all interfaces (see Synchronizing Time from the Traffic Manager). The NTP services runs on port 123 (UDP and TCP). It is safe to firewall these ports off if you do not wish to use the Traffic Manager as a local time source.

ATTENTION
One of the tests the Traffic Manager uses to detect network availability is ping. The Traffic Manager may not function correctly if your firewall or local TCP/IP tunings disable or rate-limit ICMP packets to the default gateway, the back-end nodes and the other Traffic Managers in the cluster.