Edit/etc/sysconfig/iptables, add- s 127.0.0.1 --dport 6379-J Accept-s 126.212.173.185 --dport 6379-j ACCEPTThe above add red place is only to the local and 126.212.173.185 open 6379 port, other IP with Telnet is not connected,If there is no limit to
1, the basic use of FIREWALLDStart: Systemctl start FirewalldView status: Systemctl status FirewalldStop: Systemctl Disable FIREWALLDDisable: Systemctl stop Firewalld2.systemctl is the main tool in CentOS7 's service management tool, which
In order to set up the SS in Vultr bought a Japanese VPS with the CENTOS7 system firewall is firewall for two days to sum up here.
If the small partner also prepares to buy the VPS in the vultr the registration is may use this preferential
(2) deploying a Linux environment (Centos + Nginx + Tomcat + Mysql)-firewall configuration
In my local testing practice, the following is a complete operating document for Centos + Nginx + Tomcat + Mysql on Linux. The record is as follows, we hope
Rotor http://www.linuxidc.com/Linux/2015-06/119354.htmDirectoryPreparatory workOperating EnvironmentConfirm your version of the installationDownload MySQLInstall MySQLPreparing the installation EnvironmentCompiling and installingConfigure
MySQL is divided into development version and stable version (GA), the development version has the latest features, but not stable, nor completely tested, there may be serious bugs, and stable version is a long time testing, eliminate the known bugs,
Role of the master and slave:
1. It can be used as a backup method.
2. read/write splitting to relieve the pressure on a database
MySQL master-slave backup principle:
Mysql master-slave replication requires at least two Mysql services. Of course,
Configure CentOS firewall and centos Firewall
Yesterday, I helped my friend configure the CentOS server. At the beginning, I shut down the firewall for convenience of testing. Then I needed to configure the firewall. I found several firewall rules
With the Trojan, the continuous development of the backdoor, the firewall itself is also constantly developing, this is a spear and shield and relationship, know how to escape the firewall for the control of a system is of great significance.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.