Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
cloudappliance:bestpractices [2019_10_29 00:18]
steven [4 Proxy or Load Balancer]
cloudappliance:bestpractices [2020_07_29 11:38] (current)
smeadmin
Line 7: Line 7:
  
  
-===== 1 Introduction =====+===== 1Introduction =====
  
  
Line 20: Line 20:
  
 We provide a separate white paper for High Availability guidelines. This white paper suggests some best practice but ultimately the deployment best practices are the responsibility of the deployer and should be inline with their existing deployment practices for such systems. We provide a separate white paper for High Availability guidelines. This white paper suggests some best practice but ultimately the deployment best practices are the responsibility of the deployer and should be inline with their existing deployment practices for such systems.
-===== 2 Fail2Ban =====+ 
 + 
 +===== 2Fail2Ban =====
  
  
Line 56: Line 58:
 This is an example of how Fail2Ban can be used to help prevent attacks but in an of itself it is not a solution. It is just one of the measures that can be taken for protection. This is an example of how Fail2Ban can be used to help prevent attacks but in an of itself it is not a solution. It is just one of the measures that can be taken for protection.
  
-===== 3 Internet Security Protection services =====+===== 3Internet Security Protection services =====
  
  
Line 74: Line 76:
  
  
-===== 4 Proxy or Load Balancer =====+===== 4Proxy or Load Balancer =====
  
  
Line 99: Line 101:
 A good place for further information is: [[https://​www.haproxy.com/​blog/​use-a-load-balancer-as-a-first-row-of-defense-against-ddos/​|Use a Load Balancer as a First Row of Defense Against DDOS]]. A good place for further information is: [[https://​www.haproxy.com/​blog/​use-a-load-balancer-as-a-first-row-of-defense-against-ddos/​|Use a Load Balancer as a First Row of Defense Against DDOS]].
  
 +===== 5. Hostname =====
 +
 +The mitigate [host header injection attacks](https://​www.acunetix.com/​blog/​articles/​automated-detection-of-host-header-attacks/​),​ the File Fabric provides controls to set and control the hostname can be used for the appliance. ​
  
 +To force set the hostname, apply the following configuration:​
 +```
 +var $hostname = '​sme.example.com';​
 +```
  
-===== Conclusion =====+===== 6. Conclusion =====