OriginalFirst, modify the Vi/etc/ssh/sshd_config file1, modify the default port: The default is 22, and has been commented out, the modification is to remove the comments, and modify the other ports.2, prohibit the root user remote login: Modify the
1. Modify the VI/etc/ssh/sshd_config file1. Modify the default port: the default port is 22 and has been commented out. The comment is removed and changed to another port.2. Disable remote login for the root user: Modify permitrootlogin, Which is
The security of the server is self-evident, the first step in server security setting is to block the portal.
For Linux, blocking the entrance, is not allow others to casually into our servers inside the mess, otherwise an order "RM-RF/", the
Modify the ssh port in Linux and disable remote root logon.
Modify the ssh port and disable remote root login in Linux
We all know that the default ssh port number is 22. To change the port number to 9688, You need to edit the/etc/ssh/ssh_config and/
For Linux OPS workers, using SSH remote remote server is no longer familiar! Some of the strict settings for SSH also related to server security maintenance, today, I work in the use of SSH experience, do some summary records to the next. (1) After
Common linux Services-SSH and ssh public key authentication 1. ssh (secureshell) is installed by default. the package name is openssh, [root @ localhostlogs] yuminstallopenssh & hellip; & common linux Services-SSH and ssh public key authentication 1.
Method OneMany owners have a Linux host, whether it is a virtual machine or physical machine, generally we connect remotely, are used SSH (Secureshell based on the application layer and the transport layer on the basis of the security protocol).It
Key Login Step (password-free login)SSH Login provides two kinds of authentication methods: password (password) authentication method and key authentication method. where password (password) authentication method is one of our most commonly used,
Configure the SSH service to log on to the Linux server using the certificate
Common authentication methods for logging on to a Linux server through SSH (Secure Shell) include passwords and certificates. From the security perspective, we recommend
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.