当前位置:网站首页>Common sense of cloud server security settings
Common sense of cloud server security settings
2022-07-02 04:04:00 【Yile】
1、 Server external firewall
Server security group , Some are called security groups ; Some are called firewalls
2、 External firewall and internal firewall
External firewall ( Security group / A firewall )
Built in firewall (iptables/firewalld)
3、 Firewall function :
A firewall is like a door , Imagine hiding your money in your room , At this time, a thief wants to steal your money , Thieves need to sneak into your front door first 【 External firewall ( Security group / A firewall )】,
And then sneak into your room 【 Built in firewall (iptables/firewalld)】
Although the built-in firewall and the external firewall are more secure when used together , But it affects the efficiency of data access , For speed , Sometimes just make sure it's safe , No need to be safer .
4、 Buy a good server , First, set up the external firewall
(1) Aliyun server : Configuration release 80、443、ssh port (ssh The port is recommended to be modified , Do not use default 22)
(2) Tencent cloud server : Configuration release 80、443、ping port 、ssh port (ssh The port is recommended to be modified , Do not use default 22)
Those who have purchased Tencent cloud services should pay attention to :
Create security groups , When configuring rules , Do not choose to release all ports , To select custom , Then release 80、443、ping、ssh port
5、 modify ssh Port number
modify 22 Port idea :
Let go at the external firewall first ssh Default port for 22, And then use xshell Connect with the remote connection tool ,
Then add... In the configuration file 22 port 、 new port , After the configuration is successful , After testing the new port, you can comment out the... In the configuration file 22 port , And the external firewall is prohibited 22 port
(1) Release the default port number at the external firewall 22

(2) edit /etc/ssh/sshd_config file , Add port number
vim /etc/ssh/sshd_config
- for example : Add port 22、12345, Exit after saving
Add two ports to keep 22 The purpose of the port : Prevent possible permissions and configuration issues , It can be closed after the test is successful 22 port
- The newly added port number range is recommended : When you modify the port, you'd better choose 10000~65535 Port number between ,10000 The following are easily occupied by the system or some special software , Or when a new application is going to occupy the port in the future , But you took it first , Cause the software to fail to run .

(3) restart sshd
- CentOS 7.x The above systems , Carry out orders
systemctl restart sshd.service
- CentOS 6.x The following systems , Carry out orders
/etc/init.d/sshd restart
(4) Add firewall rules , Release the modified port
- if centos7 System :
Example opening 12345 port :
* Open port 12345: firewall-cmd --zone=public --add-port=12345/tcp --permanent
● Close the port 12345: firewall-cmd --zone=public --remove-port=12345/tcp --permanent
* Reload : Make rules effective : firewall-cmd --reload
* see zone=public Port information for :firewall-cmd --list-ports --zone=public
- if centos6 System :
# iptables Profile location /etc/sysconfig/iptables
# add to 12345 Port rules
iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport 12345 -j ACCEPT
# Preservation rules
service iptables save
# Restart the service
service iptables restart
(5) The external firewall prohibits 22 port , Add the newly configured port

(6) modify xshell Port number in the attribute of , After the test connection is successful , take ssh Profile's 22 Port commented out
- modify xshell Port number in the attribute of , Test connection :

- After the test connection is successful , take ssh Profile's 22 Port commented out :
vim /etc/ssh/sshd_config

6、 The meaning of opening the firewall to release only the required ports
There is no need to expose ports casually , Otherwise there will be security risks , There are always a lot of machines scanning your ports , Try to access your service .
Especially like redis port , It may cause mining virus in you ; also ssh port 22, Every moment in the public network, someone tries to log in to your server by brutally cracking the password dictionary .
7、 Summarize the security common sense of using the server
* Minimize the number of exposed ports , And try to modify the default port number , Try to set complex passwords
* Do not use or install software from unknown sources
* Timely repair the vulnerabilities prompted by the system and known vulnerabilities of the software
* Check the log regularly
* Install anti-virus software : Kaspersky Free Edition can resist blackmail virus ; install banip Software , error 5 Secondary cipher , Refuse 24 Hours , Prevent violent password cracking ;
Minimize the number of exposed ports
First expose the necessary ports http(80)、https(443)、ssh port ( Do not use default )、ping( Tencent server needs ); Other ports that need to be released , Consider using nginx Forwarding by proxy
Modify the default port :
such as mysql The default port number is 3306, Need to use mysql If exposed , It is suggested to amend it to mysql The configuration file of is changed to another port number ;
Empathy ,redis If you want to use it on the public network , It is also suggested to modify redis The port number in the configuration file is another port number , No default 6379
Set complex password :
You can set the password , And the password should not be set too simply .
such as mysql Set too weak password , Can also pass through myql Weave into the Trojan horse program ; And such as redis Release default port 6379, And then do not set redis password , It may be embedded in the mining program .
If this article is helpful to you, remember to give me a compliment , thank !
边栏推荐
- PIP installation of third-party libraries
- Nacos 配置中心整体设计原理分析(持久化,集群,信息同步)
- MySQL advanced SQL statement 2
- 【力扣刷题】15.三数之和(双指针);17.电话号码的字母组合(递归回溯)
- 【leetcode】81. Search rotation sort array II
- Go语言介绍
- The first game of the 12th Blue Bridge Cup single chip microcomputer provincial competition
- Suggestions on settlement solution of u standard contract position explosion
- 5G時代全面到來,淺談移動通信的前世今生
- 藍湖的安裝及使用
猜你喜欢

Blue Bridge Cup single chip microcomputer sixth temperature recorder

Lei Jun wrote a blog when he was a programmer. It's awesome
![[live broadcast review] the first 8 live broadcasts of battle code Pioneer have come to a perfect end. Please look forward to the next one!](/img/46/d36ae47c3d44565d695e8ca7f34980.jpg)
[live broadcast review] the first 8 live broadcasts of battle code Pioneer have come to a perfect end. Please look forward to the next one!

BiShe cinema ticket purchasing system based on SSM

Force buckle 540 A single element in an ordered array

Use of go package
![[JS event -- event flow]](/img/fe/199890b082845f68b65f25056e6f29.jpg)
[JS event -- event flow]

First acquaintance with P4 language

go 包的使用

SQL Yiwen get window function
随机推荐
Introduction to vmware workstation and vSphere
[personal notes] PHP common functions - custom functions
WPViewPDF Delphi 和 .NET 的 PDF 查看组件
Demonstration description of integrated base scheme
Www 2022 | rethinking the knowledge map completion of graph convolution network
整理了一份ECS夏日省钱秘籍,这次@老用户快来领走
How should the team choose the feature branch development mode or trunk development mode?
[tips] use Matlab GUI to read files in dialog mode
The fourth provincial competition of Bluebridge cup single chip microcomputer
Today's plan: February 15, 2022
go 变量与常量
10 minutes to understand CMS garbage collector in JVM
【c语言】基础篇学习笔记
Recyclerview add header
Uni app - realize the countdown of 60 seconds to obtain the mobile verification code (mobile number + verification code login function)
一文彻底理解评分卡开发中——Y的确定(Vintage分析、滚动率分析等)
Handling of inconsistency between cursor and hinttext position in shutter textfield
Delete the code you wrote? Sentenced to 10 months!
JVM知识点
Pandora IOT development board learning (RT thread) - Experiment 1 LED flashing experiment (learning notes)