--On Friday, July 17, 2020 6:43 AM +0530 Kaushal Shriyan
wrote:
Please refer to my pastebin link https://paste.centos.org/view/cd55a9a6.
Basically I want to allow the below mentioned ruleset on the server
(CentOS Linux release 8.2.2004 (Core)) and drop the rest of the network
traffic from
On Fri, Jul 17, 2020 at 2:41 AM Kenneth Porter
wrote:
> --On Thursday, July 16, 2020 10:41 PM +0530 Kaushal Shriyan
> wrote:
>
> > I have run the below command but I am still able to connect from the
> > internet. Do I need to add any drop traffic policy using nft?
>
> A single rule doesn't
--On Thursday, July 16, 2020 10:41 PM +0530 Kaushal Shriyan
wrote:
I have run the below command but I am still able to connect from the
internet. Do I need to add any drop traffic policy using nft?
A single rule doesn't tell us enough. Dump the entire firewall to a
pastebin and post the
Am 16.07.20 um 18:11 schrieb Kaushal Shriyan:
On Thu, Jul 16, 2020 at 9:25 PM Phil Perry wrote:
On 16/07/2020 16:48, Kaushal Shriyan wrote:
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I
am
running the below iptables command to allow SSH port 22 from a
You haven't given us enough to make a good evaluation. Is your INPUT policy
DROP? Is your ssh destination this system or elsewhere, it makes a difference.
I'm hearing iptables can still be used with nftables but I haven't had need to
investigate, you should look into the interaction of the
On Thu, Jul 16, 2020 at 9:25 PM Phil Perry wrote:
> On 16/07/2020 16:48, Kaushal Shriyan wrote:
> > Hi,
> >
> > I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I
> am
> > running the below iptables command to allow SSH port 22 from a specific
> > source IP 219.91.200.59
> >
On 16/07/2020 16:48, Kaushal Shriyan wrote:
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I am
running the below iptables command to allow SSH port 22 from a specific
source IP 219.91.200.59
iptables -A INPUT -m tcp -p tcp -s 219.91.200.59 --dport 22 -j ACCEPT
Am 16.07.2020 um 17:48 schrieb Kaushal Shriyan:
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I am
running the below iptables command to allow SSH port 22 from a specific
source IP 219.91.200.59
iptables -A INPUT -m tcp -p tcp -s 219.91.200.59 --dport 22 -j ACCEPT
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I am
running the below iptables command to allow SSH port 22 from a specific
source IP 219.91.200.59
iptables -A INPUT -m tcp -p tcp -s 219.91.200.59 --dport 22 -j ACCEPT
> service iptables save
The above iptables
Hi Chris,
There is no general best practice available as it heavily depends on the
use case/ support requirements and other factors. For example, I start with
a minimum installation and then I use Ansible to apply my personal/ company
flavor (tools/ configuration/ ...). The result is a core VM
10 matches
Mail list logo