[CentOS] securing a remotely hosted machine
Robert Spangler
mlists at zoominternet.netSun Aug 22 17:04:55 UTC 2010
- Previous message: [CentOS] securing a remotely hosted machine
- Next message: [CentOS] securing a remotely hosted machine
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
On Friday 20 August 2010 10:55, Brunner, Brian T. wrote: > 2: Log-ins through firewall allowed only from approved IPs/MACs > regardless of possession of correct password. One can never guarantee that they will be a at the approved IP/MAC Address when issues arise. For this reason I would use SSH-Keys for access to the machine. I would also move the port to something other then the default port and block 22 at the firewall. After that I would run something like fail2ban and drop any IP Address that fails to log in on the new port should that port be discovered by unauthorized persons. -- Regards Robert Linux The adventure of a life time. Linux User #296285 Get Counted http://counter.li.org/
- Previous message: [CentOS] securing a remotely hosted machine
- Next message: [CentOS] securing a remotely hosted machine
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list