Filed in Product & Development by Brandon Philips | November 27, 2012 3:30 pm
We know that the public internet can be a scary place for servers. Log files of servers attached to public addresses show regular port scans and URL snooping and are a constant reminder that your hosts are one misconfiguration away from catastrophe.
To help you avoid disaster and thwart potential threats, we’ve created a handy guide to walk you through the creation of bastion hosts and isolated cloud networks.
What’s a bastion host? It’s a choke point that only offers authorized users access to the hosts behind it. It’s like a gatekeeper: it won’t let anyone in who isn’t on the guest list.
And with Rackspace Cloud Networks, you can create Rackspace Cloud Servers that do not have a public IP and attach only to an isolated Class A, B or C network that only your Cloud Servers can talk to.
This increases the security of your infrastructure servers and adds an extra layer of defense.
For a deep, technical dive into protecting your infrastructure servers with bastion hosts and isolated cloud networks, check out our guide on the Rackspace DevOps blog.
And, remember, Cloud Networks is currently being rolled out to Rackspace customers. You may already have access, and if you don’t, you can request access now.
Source URL: http://www.rackspace.com/blog/protect-servers-using-bastion-hosts-and-isolated-cloud-networks/
Copyright ©2014 The Official Rackspace Blog unless otherwise noted.