Home > Article > Operation and Maintenance > How to secure a CentOS server using encrypted Remote Terminal Protocol (RDP)
How to protect CentOS server using encrypted Remote Terminal Protocol (RDP)
Overview:
In the current network environment, the security of the server is crucial. To protect CentOS servers from unauthorized access and attacks, we can use encrypted Remote Terminal Protocol (RDP) to connect to the server remotely. This article will describe how to set up and configure an encrypted RDP connection on a CentOS server, and provide relevant code examples.
Step 1: Install the Xfce desktop environment
Installing the Xfce desktop environment on the CentOS server is to provide a graphical interface to facilitate our configuration and operation. Execute the following command to install the Xfce desktop environment:
sudo yum groupinstall "Xfce"
Step 2: Install the xrdp package
xrdp is an open source RDP server that allows us to connect remotely through the RDP protocol. Execute the following command to install the xrdp package:
sudo yum install xrdp
Step 3: Set up firewall rules
In order to allow RDP connections, we need to set up firewall rules to allow the RDP service to pass. Execute the following command to open port 3389 of the firewall:
sudo firewall-cmd --add-port=3389/tcp --permanent sudo firewall-cmd --reload
Step 4: Start the xrdp service
Execute the following command to start the xrdp service:
sudo systemctl start xrdp sudo systemctl enable xrdp
Step 5: Create a new user account
For security reasons, it is not recommended to use the root account for remote connection. We can create a new user account and add it to the "sudo" group to gain administrator rights. Execute the following command to create a new user account:
sudo adduser your_username sudo passwd your_username sudo usermod -aG wheel your_username
Step 6: Test the RDP connection
Now, we can connect to the CentOS server through any remote desktop application that supports the RDP protocol. Open the RDP client application, enter the IP address and port number of the CentOS server, 3389, and log in using the new user account you created earlier.
Code Example:
The following is a sample code written in Python that automates the above setup and configuration steps:
import os def install_xfce(): os.system('sudo yum groupinstall "Xfce"') def install_xrdp(): os.system('sudo yum install xrdp') def configure_firewall(): os.system('sudo firewall-cmd --add-port=3389/tcp --permanent') os.system('sudo firewall-cmd --reload') def start_xrdp_service(): os.system('sudo systemctl start xrdp') os.system('sudo systemctl enable xrdp') def create_user(username, password): os.system(f'sudo adduser {username}') os.system(f'sudo passwd {username}') os.system(f'sudo usermod -aG wheel {username}') def main(): install_xfce() install_xrdp() configure_firewall() start_xrdp_service() username = input('Enter the new username: ') password = input('Enter the new password: ') create_user(username, password) if __name__ == '__main__': main()
Summary:
By using the encrypted Remote Terminal Protocol (RDP), we can protect CentOS servers from unauthorized access and attacks. This article provides a detailed step-by-step guide to setting up and configuring an encrypted RDP connection, with corresponding code examples for reference. Remember, server security is an ongoing process, and we should regularly update and strengthen server security measures to ensure server security.
The above is the detailed content of How to secure a CentOS server using encrypted Remote Terminal Protocol (RDP). For more information, please follow other related articles on the PHP Chinese website!