Tuesday, April 9, 2013

Configure GLPI



GLPI installation guide | Step by Step Configuration | Setup
Tuesday, July 13, 2010  GLPI, INSTALLATION  2 comments

Step By Step GLPI Installation Guide for linux

Requirements






1) Working Apache server

2) Working Mysql Server
3) Latest version of GLPI

Step by Step Installation






1) Mysql configuration





Login to mysql server through shell (or webmin). Create database glpidbdb name - glpidb, username - glpiuser , password - glpipwd
#mysql -u root -p ( enter the mysql root password)
mysql> create database glpidb;
mysql> grant all privileges on glpidb.* to glpiuser@localhost identified by 'glpipwd';
mysql> exit

If you are ruining apache and mysql in different servers, you have to use glpiuser@apacheserverip 2)GLPI installation





Login to apache server host through shellDownload the latest glpi archive
Un tar glpi-0.72.4.tar.gz in the web root directory
#tar -xvzf glpi-0.72.4.tar.gz -C /var/www/html/
#cd /var/www/html
#chown -R apache glpi

Add dns engry for your support website ( support.example.com to 192.168.1.2 (replace with your ip) )If you don't have dns server, you can use the ip directly

edit /etc/httpd/conf/httpd.conf and add the following configurations
< VirtualHost 192.168.1.2:* >
DocumentRoot /var/www/html/glpi
ServerName support.example.com
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
    < Directory "/var/www/html/glpi"  >
        DirectoryIndex index.php
    < /Directory >
Options ExecCGI
< /VirtualHost >

Or add alias for this glpi directory





Restart apache server
#service httpd restart
Browse your support url http://support.example.com  or ip (from remote computer)
for directory access use http://192.168.1.2/glpi ( from local host http://localhost/glpi)

Click on Installation button



Click Continue

Enter the Mysql user name password details and continuehost - mysqlserverip (localhost)
User Name= glpiuser
Password = glpipwd
Step 2





Select the database glpi form the shown list and continue
















IPTABLES for fedora Linux


Here I have mentioned the basic configurations for enabling iptables in fedora linux.
#iptables -L

will list your current iptables configuration.

To allow established sessions to receive traffic

# iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

You could start by blocking traffic, but you might be working over SSH, where you would need to allow SSH before blocking everything else.

To allow incoming traffic on the default SSH port (22), you could tell iptables to allow all TCP traffic on that port to come in.

# iptables -A INPUT -p tcp --dport ssh -j ACCEPT

Now check the current configuration
# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:ssh


For Interface based access for eth0 specify -i eth0
Once we enabled the ssh port.we can drop all other incoming ports.

# iptables -A INPUT -j DROP

Now check the rule
# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:ssh
DROP       all  --  anywhere             anywhere


In the final step we have to enable loopback interface. After all the traffic has been dropped. We need to insert this rule before that. Since this is a lot of traffic, we'll insert it as the first rule so it's processed first.

#iptables -I INPUT 1 -i lo -j ACCEPT

To enabling logging

# iptables -I INPUT 5 -m limit --limit 5/min -j LOG --log-prefix "iptables denied: " --log-level 7

To save this configuration
# iptables-save > /etc/sysconfig/iptables
or
#service iptables save
#service iptables start

This configuration will enable ssh port and disable all other incoming ports.








IPTABLES for Fedora| Redhat Linux



Basic Setup:

Here I have mentioned the basic configurations for enabling iptables in fedora linux.
#iptables -L

will list your current iptables configuration.

1) To allow established sessions to receive traffic

# iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

2) You could start by blocking traffic, but you might be working over SSH, where you would need to allow SSH before blocking everything else.

To allow incoming traffic on the default ssh port (22)

# iptables -A INPUT -p tcp --dport 22 -j ACCEPT


To allow incoming traffic on the default Squid port (3128)

# iptables -A INPUT -p tcp --dport 3128 -j ACCEPT


To allow incoming traffic on the default Apache port 

# iptables -A INPUT -p tcp --dport 80 -j ACCEPT

To allow incoming traffic on the default samba port 

# iptables -A INPUT -p udp --dport 137 -j ACCEPT
# iptables -A INPUT -p udp --dport 138 -j ACCEPT
# iptables -A INPUT -p udp --dport 139 -j ACCEPT
# iptables -A INPUT -p tcp --dport 139 -j ACCEPT
# iptables -A INPUT -p tcp --dport 445 -j ACCEPT  

To allow incoming traffic on the default SNMP port  (161)

# iptables -A INPUT -p tcp --dport 161 -j ACCEPT
# iptables -A INPUT -p udp --dport 161 -j ACCEPT

Now check the current configuration
# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:http
ACCEPT     tcp  --  anywhere             anywhere            udp dpt:netbios-ns
ACCEPT     tcp  --  anywhere             anywhere            udp dpt:netbios-dgm
ACCEPT     tcp  --  anywhere             anywhere            udp dpt:netbios-ssn
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:netbios-ssn
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:snmp
ACCEPT     tcp  --  anywhere             anywhere            udp dpt:snmp
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:microsoft-ds
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:squid


3) Once we enabled the above port.we can drop all other incoming ports.

# iptables -A INPUT -j DROP

Now check the rule
# iptables -L


For Interface based access for eth0 specify -i eth0

4) In the final step we have to enable loopback interface. After all the traffic has been dropped. We need to insert this rule before that. Since this is a lot of traffic, we'll insert it as the first rule so it's processed first.

#iptables -I INPUT 1 -i lo -j ACCEPT


5) To enabling logging

# iptables -I INPUT 5 -m limit --limit 5/min -j LOG --log-prefix "iptables denied: " --log-level 7

6) To save this configuration
# iptables-save >  /etc/sysconfig/iptables
or
#service iptables save 
#service iptables start

This configuration will enable ssh port and disable all other incoming ports.
To manually edit iptables config
Also you can manual edit  /etc/sysconfig/iptables


IP Tables configuration for other Services


1) Iptables for default ldap port

# iptables -A INPUT -p tcp --dport 389 -j ACCEPT
# iptables -A INPUT -p tcp --dport 636 -j ACCEPT

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  389 -j ACCEPT

2) Iptables for Backup Exec

3) IP tables for smtp

 #iptables -A INPUT -p tcp --dport 25 -j ACCEPT

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  25 -j ACCEPT 


4) iptables for smtps

 #iptables -A INPUT -p tcp --dport 465 -j ACCEPT

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  465 -j ACCEPT

5) iptables for pop3 , pop3s

 #iptables -A INPUT -p tcp --dport 110 -j ACCEPT
 #iptables -A INPUT -p tcp --dport 995 -j ACCEPT

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  110 -j ACCEPT
-A INPUT -p tcp -m tcp --dport  995 -j ACCEPT

6) iptables for imap , imaps

 #iptables -A INPUT -p tcp --dport 143 -j ACCEPT
 #iptables -A INPUT -p tcp --dport 993 -j ACCEPT 

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  143 -j ACCEPT
-A INPUT -p tcp -m tcp --dport  993 -j ACCEPT

7) iptables for webmin default port

 #iptables -A INPUT -p tcp --dport 10000 -j ACCEPT

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  1000 -j ACCEPT


8) IPtables for named, domain

 #iptables -A INPUT -p tcp --dport 53 -j ACCEPT
 #iptables -A INPUT -p udp --dport 53 -j ACCEPT 

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  53 -j ACCEPT
-A INPUT -p udp -m udp --dport  53 -j ACCEPT

9) iptables  for TFTP server

 #iptables -A INPUT -p udp --dport 69 -j ACCEPT

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p udp -m udp --dport  69 -j ACCEPT


 10) iptable configuration for DHCP server

 
#iptables -A INPUT -p udp --dport 67 -j ACCEPT 
 #iptables -A INPUT -p udp --dport 68 -j ACCEPT 


or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p udp -m udp --dport  67 -j ACCEPT
-A INPUT -p udp -m udp --dport  68 -j ACCEPT

 11) iptables for NFS server- click here

12) iptables for FTP server - click here


13) iptables  for NTP server

 #iptables -A INPUT -p udp --dport 123 -j ACCEPT

or manually edit /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p udp -m udp --dport  123 -j ACCEPT
 


Wednesday, May 19, 2010  IPTABLES, NFS  1 comment


Iptables for NFS server

Step 1

 To enable NFS clients to access NFS server we need to enable the following services.

a] TCP/UDP 111 - RPC 4.0 portmapper
b] TCP/UDP 2049 - NFSD (nfs server)
c] Portmap static ports - Dynamic ports defined in /etc/sysconfig/nfs file.

 Port mapper assigns each NFS service to a port dynamically at service startup time. Dynamic ports cannot be protected by port filtering firewalls such as iptables. So we need to configure static ports for port map service

Edit /etc/sysconfig/nfs and add the below mentioned lines

#vim /etc/sysconfig/nfs

RQUOTAD_PORT=875

LOCKD_TCPPORT=32803

LOCKD_UDPPORT=32769
MOUNTD_PORT=892
STATD_PORT=662
STATD_OUTGOING_PORT=2020

Save the file and restart the service

# service portmap restart
# service nfs restart
# service rpcsvcgssd restart



Step 2

IP tables configuration for nfs

#iptables -A INPUT -p tcp --dport 110 -j ACCEPT
#iptables -A INPUT -p udp --dport 110 -j ACCEPT





#iptables -A INPUT -p tcp --dport 2049 -j ACCEPT





#iptables -A INPUT -p tcp --dport 662 -j ACCEPT




#iptables -A INPUT -p udp --dport 662 -j ACCEPT



#iptables -A INPUT -p tcp --dport 875 -j ACCEPT


#iptables -A INPUT -p udp --dport 875 -j ACCEPT

#iptables -A INPUT -p tcp --dport 892 -j ACCEPT
#iptables -A INPUT -p udp --dport 892 -j ACCEPT
#iptables -A INPUT -p tcp --dport 32803 -j ACCEPT
#iptables -A INPUT -p udp --dport 32769 -j ACCEPT

Now Save and restart iptables
# iptables-save > /etc/sysconfig/iptables
or





#service iptables save

#service iptables restart












Also you can manually edit and /etc/sysconfig/iptables and add the below mentioned line




-A INPUT -p tcp -m tcp --dport  110 -j ACCEPT
-A INPUT -p udp -m udp --dport  110 -j ACCEPT





-A INPUT -p tcp -m tcp --dport  662 -j ACCEPT





-A INPUT -p udp -m udp --dport  662 -j ACCEPT 




-A INPUT -p tcp -m tcp --dport  875 -j ACCEPT



-A INPUT -p udp -m udp --dport  875 -j ACCEPT 


-A INPUT -p tcp -m tcp --dport  892 -j ACCEPT

-A INPUT -p udp -m udp --dport  892 -j ACCEPT
-A INPUT -p tcp -m tcp --dport  2049 -j ACCEPT
-A INPUT -p tcp -m tcp --dport  32803 -j ACCEPT
-A INPUT -p udp -m udp --dport  32769 -j ACCEPT



Wednesday, May 19, 2010  IPTABLES, VSFTP  1 comment

IPTABLES configuration  for VSFTPD server

1) Add following lines in /etc/modprobe.conf
alias ip_conntrack ip_conntract_ftp ip_nat_ftp

or run# modprobe ip_conntrack_ftp 





#modprobe ip_nat_ftp





2) Allow incoming traffic on the default Ftp port (21)





# iptables -A INPUT -p tcp --dport 21 -j ACCEPT





save this configuration

# iptables-save >  /etc/sysconfig/iptables
or





#service iptables save

or manually edit /etc/sysconfig/iptables and add the below mentioned line-A INPUT -p tcp -m tcp --dport  21 -j ACCEPT 







Restart iptables
#service iptables start



Tuesday, May 18, 2010  IPTABLES, SSH  No comments

How to enable ssh port in iptables ?


Iptables Basic configuration






 





Enabling source IP based access





Edit /etc/sysconfig/iptables and add the following lines


#vim /etc/sysconfig/iptables

*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1888:534373]
-A INPUT -i lo -j ACCEPT
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -d x.x.x.x/32 -p tcp -m tcp --dport 22 -j ACCEPT





-A INPUT -j DROPCOMMIT

replace x.x.x.x with your interface ip


Enabling interface based access






*filter

:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1888:534373]
-A INPUT -i lo -j ACCEPT
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT





-A INPUT -j DROPCOMMIT


Restart iptables service
#service iptables restart


Linux iptables configuration for Symantec Backup Exec


Here I have described , how to enable the backup exec agent ports on Linux iptables configuration
By default Symantec backup exec will be running on dynamic ports . So we have to manually configure the dynamic port range in the backup exec server.
To configure the dynamic port range manually, follow the below steps.

In the symantec backup exec go to 
Tools -- Options --  Network Security and check Enable remote agent TCP dynamic port range
and specify the ports range manualy . Port range 31821-32829


Restart the backup exec server

Now  login to the linux machine and enable access for this port range (31821-32829) and the Backup Exec agent  VRTSralus which is running on the port 10000 (default port for VRTSralus). 
If webmin is running on the port 10000, edit /etc/webmin/miniserv.conf and change the default port to 10001


#iptables -A INPUT -p tcp --dport 10000 -j ACCEPT
#iptables -A INPUT -p tcp --dport 32821:32829 -j ACCEPT

 Now Save and restart iptables
 # iptables-save > /etc/sysconfig/iptables
or
#service iptables save
#service iptables restart


Also you can manually edit and /etc/sysconfig/iptables and add the below mentioned line

-A INPUT -p tcp -m tcp --dport  10000 -j ACCEPT
-A INPUT -p tcp -m tcp --dport  32821:32829 -j ACCEPT 

IPTABLES NAT for fedora linux

If your have two network cards eth0, eth1
lets assume
eth0 is connected to local network
eth1 is connected to public network(or ppp0)

Masquerading

1)To enable nat on eth0 for all local network users

If you are running iptables service,  use the following method

#echo 1 > /proc/sys/net/ipv4/ip_forward
#iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE

To save this changes
#iptables-save > /etc/sysconfig/iptables
or  
#service iptables save
#service iptables restart

This will enable Masquerade. Now you can configure eth0 as the gateway for local network.

If you are not running iptables service
edit /etc/rc.local and add the below lines

echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE


Then  execute the ./rc.local file

2) To enable nat on eth0 for specified network user ips

#echo 1 > /proc/sys/net/ipv4/ip_forward
#iptables -t nat -A POSTROUTING -s x.x.x.x(ip of local user system1) -o eth1 -j MASQUERADE
#iptables -t nat -A POSTROUTING -s x.x.x.x(ip of local user system2) -o eth1 -j MASQUERADE
#iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE 


Port Redirection

1)To redirect external 80 port traffic to 3128 port

#iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -j REDIRECT --to-port 3128

2)To redirect external rdp port traffic to any local systems rdp port.

#iptables -t nat -A PREROUTING -t nat -p tcp -d x.x.x.x(eth1 ip) --dport 3389 -j DNAT --to x.x.x.x(ip of any local network system):3389
 or
#iptables -t nat -A PREROUTING -t nat -p tcp -d x.x.x.x(eth1 ip) --dport 3382 -j DNAT --to x.x.x.x(ip of any local network system):3389


Monday, May 03, 2010  ACL, SQUID  No comments

How to enable Time based access in squid proxy server ?

Below you can find the squid time based access.
Edit squid.conf and add the below mentioned lines






User Based restriction

acl USER1 proxy_auth raj
acl USER2 proxy_auth sam
acl DAY time 08:00-18:00
http_access allow USER1 DAY
http_access deny USER1
http_access allow USER2 !DAY
http_access deny USER2



Special Access
acl After_Office time SMTWHFA 20:00-24:00
acl Before_Office time SMTWHFA 00:00-08:30


acl Proxy_Afrer8 proxy_auth  user1 user2
http_access deny  Before_Office #(Deny access to all users)
http_access deny After_Office !Proxy_Afrer8  # (This will exclude user1,user2)
http_access allow ntlm_users
http_access deny all                   

IP Based Restriction
acl IPGROUP01 src 10.1.2.3 10.1.2.4
acl WORKINGHOUR time MTWHF 08:30-17:30
http_access allow IPGROUP01 WORKINGHOUR
http_access deny IPGROUP01




Monday, May 03, 2010  ACL, NTLM, SQUID  No comments

How to enable NTLM Auth in squid proxy server:

Step 1
 Configure samba with winbind support

Step 2

  Edit  squid.conf and add the following lines

auth_param ntlm program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp
auth_param basic program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-basic





auth_param basic realm Squid Proxy server





auth_param basic credentialsttl 2 hour




auth_param basic children 5



auth_param basic casesensitive off


auth_param ntlm children 20

authenticate_cache_garbage_interval 10 seconds

acl ntlm_users proxy_auth REQUIRED

http_access allow ntlm_usershttp_access deny all



Restart Squid proxy server
#service squid restrat


How to Block skype on squid proxy server


Edit squid.conf and add the below mentioned lines. This will allow skype for user1, user 2 and deny for all.

acl numeric_IPs url_regex -i ^([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)
acl Skype_UA browser ^skype^
acl Skype_Allowed_Users proxy_auth user1 user2

http_access deny numeric_IPS !Skype_Allowed_Users
http_access deny Skype_UA !Skype_Allowed_Users 


http_access allow ntlm_users
http_access deny all



Install GLPI on a GNU/Linux Debian

We start by assuming that you have a running Debian Woody on your computer.

Apache, PHP and MySQL installation

First, install the Apache Web server (wwww.apache.org)
As GLPI is programmed in PHP, it is necessary to install the PHP module for Apache.
The use of the apt-get tool will make it easier.
As root (all commands below have to be entered as root) :
hector#
hector# apt-get install apache php4
 
This will warn you of the packages that are about to install. You should say yes to these when prompted.
GLPI uses a MySQL (www.mysql.com) database for its back end, so it is neccessary to install mysql-server and its associated PHP libraries.
hector#
hector# apt-get install mysql-server php4-mysql
 
We have now enough software to run GLPI, but there are some additional steps to perform.
First, we have to create a password for the root user of the MySQL server (for evident security reasons).
hector#
hector# mysqladmin -u root  password 'password'
 
Now we are going to create the glpidb database which will be used by GLPI.
 
hector#mysql -u root -p
enter password : ******* 
mysql> create database glpidb;
We are also going to create glpiuser user (with a password) and to give it the necessary rights :
hector#
mysql>grant all privileges on glpidb.* to glpiuser@localhost 
mysql>identified by 'glpiuser_password';
 
If you want to administer your database from an easy to use front end, you can install phpmyadmin. It's MySQL database management tool written in PHP you can use with a web browser. An apt-get phpmyadmin should be all you need to run to install this, but any additonal steps required are out of the scope of this page.

Download and install GLPI

You now have to download the latest version of GPLI on the http://glpi-project.org website, “Download” section. (Debian has its own .deb package for GPLI available via apt-get, however this currently is several revisons behind the latest release).
Then you have to unzip the tarball in the /var/www directory Apache created for you :
hector#
hector#tar -xvzf glpi-X.X.X.tar.gz -C  /var/www/
 
Change directory to /var/www
Now you will have to give rights to some folders :
hector#
hector#cd /var/www/glpi
hector#chmod 777 backups/dump    glpi/config   docs

GLPI Configuration

In your web browser, go to http://your_server/glpi where you should see a GLPI install page.
Follow the step-by-step instructions which will guide you through the install steps. Once the installed has completed you will be presented with the GLPI login page. To re-run this installer, incase of any errors or missed steps above, delete the following file :
  • /var/www/glpi/config/config_db.php
By deleting this file, and re-visiting http://your_server/glpi will cause the installation script to re-run.

No comments:

Post a Comment