Home >Operation and Maintenance >Linux Operation and Maintenance >How to protect CentOS servers from cyberattacks
How to protect CentOS servers from network attacks
Nowadays, network security issues are becoming increasingly serious, and server security is one of the key elements for the operation of websites and applications. This article will explain how to protect CentOS servers from network attacks and provide some specific code examples.
On CentOS, you can use the following command to update system packages:
sudo yum update
# 检查防火墙状态 sudo systemctl status firewalld # 启动防火墙 sudo systemctl start firewalld # 停止防火墙 sudo systemctl stop firewalld # 开机启动防火墙 sudo systemctl enable firewalld # 关闭开机启动 sudo systemctl disable firewalld # 开启端口 sudo firewall-cmd --zone=public --add-port=80/tcp --permanent # 重新加载规则 sudo firewall-cmd --reload
su
command to switch to root User performs management operations. # 生成密钥对 ssh-keygen -t rsa # 复制公钥到服务器 ssh-copy-id user@server # 修改SSH配置文件 sudo vi /etc/ssh/sshd_config 将以下行修改或添加为: PasswordAuthentication no PubkeyAuthentication yes
# 修改SSH配置文件 sudo vi /etc/ssh/sshd_config 将以下行修改或添加为: MaxAuthTries 3
# 安装Nginx sudo yum install nginx # 生成SSL证书 sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/nginx.key -out /etc/nginx/nginx.crt # 配置Nginx sudo vi /etc/nginx/conf.d/default.conf 将以下行修改或添加为: server { listen 443 ssl; ssl_certificate /etc/nginx/nginx.crt; ssl_certificate_key /etc/nginx/nginx.key; ... } # 重启Nginx sudo systemctl restart nginx
# 安装Snort sudo yum install epel-release -y sudo yum install snort -y # 配置Snort sudo vi /etc/snort/snort.conf 进行必要的配置,如网络IP、规则文件等。 # 启动Snort sudo snort -d -c /etc/snort/snort.conf
To sum up, protecting CentOS servers from network attacks is a multifaceted effort. Only through the comprehensive use of multiple security measures can server security be better protected. The most important thing is to update the system in time, install firewalls, harden SSH and use security protocols. With the installation of an intrusion detection system, abnormal behaviors can be discovered in a timely manner and responded accordingly. The sample code provided above can help you better implement these security measures.
The above is the detailed content of How to protect CentOS servers from cyberattacks. For more information, please follow other related articles on the PHP Chinese website!