SSMC appliance configurations
Procedure
- Set the CA-signed certificates for SSMC.
-
Configure the following properties in
ssmc.properties
and save it:security.max.active.ui.sessions=50 security.max.active.ui.per.user.sessions=1 ssmc.smtps.enabled=true ssmc.secure.tls.only=true server.session.timeout=10 server.absolute.session.timeout=60 ssmc.management.notification.disable=true ssmc.tls.trustmanager.enabled=true
-
Set the following properties in
/ssmc/conf/security_config.properties
and save it. The properties that need your input are enclosed within angular braces < >:ssmc.sshd.service.network=ens192 #eth1 if hyper-v ssmc.webserver.service.network=ens160 #eth0 if hyper-v ssmc.shell.session.inactivity.timeout=300 ssmc.ntp.DnsOrIP=<NTP Host DNS or IP> ssmc.inbound.hosts.allow=<IPs of inbound whitelisted hosts> ssmc.outbound.hosts.allow=<IPs of whitelisted outbound hosts on any network> ssmc.rsyslog.server.host=<rsyslog server ip> ssmc.rsyslog.server.port=<rsyslog server port> #6514 ssmc.rsyslog.server.protocol=tcp ssmc.rsyslog.server.tls-enabled=1 ssmc.rsyslog.cert.caroot=</home/ssmcadmin/rsyslog/ca.pem> ssmc.rsyslog.cert.clientcert=</home/ssmcadmin/rsyslog/client.pem> ssmc.rsyslog.cert.clientkey=</home/ssmcadmin/rsyslog/client.key> ssmc.rsyslog.server.permittedPeers=”<remote logging host name>” ssmc.rsyslog.server.device=ens192 #eth1 if hyper-v ssmc.rsyslog.queue.maxdiskspace=1 ssmc.rsyslog.smtp.alert=true ssmc.rsyslog.smtp.server=<smtp server ip> ssmc.rsyslog.smtp.port=<smtp port> ssmc.rsyslog.smtp.recipient=<comma separated recipient email address list> ssmc.rsyslog.smtp.notify-interval=5 ssmc.rsyslog.smtp.mailFrom=<ssmcadmin@ssmc.com>
-
Run the following commands in the given sequence (opt
no
for service restarts):sudo /ssmc/bin/config_security.sh -o set_file_permission sudo /ssmc/bin/config_security.sh -o cnsa_mode_appliance -a enable sudo /ssmc/bin/config_security.sh -o session_log -a enable sudo /ssmc/bin/config_security.sh -o ssh_service_network -a set sudo /ssmc/bin/config_security.sh -o webserver_service_network -a set sudo /ssmc/bin/config_security.sh -o session_lock -a enable sudo /ssmc/bin/config_security.sh -o shell_session_idle_timeout -a set sudo /ssmc/bin/config_security.sh -o remote_syslog_appliance -a set sudo /ssmc/bin/config_security.sh -o host_access -a set sudo /ssmc/bin/config_security.sh -o http_access_log -a enable sudo /ssmc/bin/config_security.sh -o tcp_access_log -a enable sudo /ssmc/bin/config_security.sh -o long_password_policy -a enable sudo /ssmc/bin/config_security.sh -o config_failedlogin_delay -a enable sudo /ssmc/bin/config_security.sh -o sudo_password -a enable sudo /ssmc/bin/config_security.sh -o verbose_shell_session_logs -a enable sudo /ssmc/bin/config_security.sh -o configure_ntp -a set sudo /ssmc/bin/config_security.sh -o fips_mode -a enable
NOTE: Ensure that all operations are successful. Recheck your configuration and re-run until each of the above operations is successful. - Reboot the appliance using TUI menu option 3.
This completes all the configurations needed to set up SSMC to adhere to standards security.