Scyld ClusterWare HPC: Installation Guide | ||
---|---|---|
<< Previous | Quick Start Installation | Next >> |
![]() | The security features provided with this system do not guarantee a completely secure system. |
The Firewall Configuration screen presented during the RHEL5 installation applies to the public network interface and should be set according to your local standards.
The RHEL5 installer allows you to select some, but not all, of the security settings needed to support Scyld ClusterWare. The remaining security settings must be made post-installation; see the Section called Trusted Devices
Scyld has the following recommendations for configuring the firewall:
Set a firewall for the public network interface (typically eth0).
If you chose to install a firewall, you must make the private network interface (typically eth1) a "trusted device" to allow all traffic to pass to the internal private cluster network; otherwise, the cluster will not run correctly. This setting must be made post-installation.
The Red Hat installer configures the firewall with most services disabled. If you plan to use SSH to connect to the master node, be sure to select SSH from the list of services in the Firewall Configuration screen to allow SSH traffic to pass through the firewall.
<< Previous | Home | Next >> |
Network Interface Configuration | Up | Red Hat Installation |