Difference between revisions of "IT-OS-Admin-Linux"

From wiki.samerhijazi.net
Jump to navigation Jump to search
(Setting Firewall)
(Kostenlose Kurse)
Line 1: Line 1:
 
==Kostenlose Kurse==
 
==Kostenlose Kurse==
 
*RHEL: https://www.redhat.com/en/services/training/rh024-red-hat-linux-technical-overview
 
*RHEL: https://www.redhat.com/en/services/training/rh024-red-hat-linux-technical-overview
 +
==SSH==
 +
<pre class="code">
 +
sudo dnf install openssh-client
 +
sudo dnf install openssh-server
 +
sudo systemctl restart sshd.service
 +
sudo systemctl enable sshd.service
 +
..
 +
Key-Typs: RSA algorithm and DSA algorithm.
 +
$HOME/.ssh/id_rsa: The file contains the RSA private key.
 +
$HOME/.ssh/id_rsa.pub: The file contains the RSA public key.
 +
$HOME/.ssh/authorized_keys: The file contains the keys that can be used for logging into system.
 +
..
 +
sudo nano /etc/ssh/ssh_config
 +
sudo nano /etc/ssh/sshd_config
 +
------------------------------
 +
RSAAuthentication yes
 +
PubkeyAuthentication yes
 +
AuthorizedKeysFile %h/.ssh/authorized_keys
 +
PasswordAuthentication no # Yes: Can login with Password; No: Can’t login with Password
 +
------------------------------
 +
/etc/init.d/ssh restart
 +
..
 +
ssh-keygen -t rsa -b 4096 -C "samerhijazi@hotmail.com" # Generate prv and pub Key
 +
ssh-copy-id –i id_rsa.pub user@hostname # Copy Pub-Key to server
 +
ssh –i id_rsa user@hotname # Login server with prv-key
 +
..or
 +
cat ~/.ssh/id_rsa.pub | ssh user@hostname "mkdir -p ~/.ssh && cat >> ~/.ssh/authorized_keys"
 +
ssh user@hostname "echo `cat ~/.ssh/id_rsa.pub` >> ~/.ssh/authorized_keys"
 +
</pre>
  
 
==Setting Firewall==
 
==Setting Firewall==

Revision as of 21:18, 20 August 2019

Kostenlose Kurse

SSH

sudo dnf install openssh-client
sudo dnf install openssh-server
sudo systemctl restart sshd.service
sudo systemctl enable sshd.service
..
Key-Typs: RSA algorithm and DSA algorithm.
$HOME/.ssh/id_rsa: The file contains the RSA private key.
$HOME/.ssh/id_rsa.pub: The file contains the RSA public key.
$HOME/.ssh/authorized_keys: The file contains the keys that can be used for logging into system.
..
sudo nano /etc/ssh/ssh_config
sudo nano /etc/ssh/sshd_config
------------------------------
RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile %h/.ssh/authorized_keys
PasswordAuthentication no						# Yes: Can login with Password; No: Can’t login with Password
------------------------------
/etc/init.d/ssh restart
..
ssh-keygen -t rsa -b 4096 -C "samerhijazi@hotmail.com"	# Generate prv and pub Key
ssh-copy-id –i id_rsa.pub user@hostname			# Copy Pub-Key to server
ssh –i id_rsa user@hotname					# Login server with prv-key
..or
cat ~/.ssh/id_rsa.pub | ssh user@hostname "mkdir -p ~/.ssh && cat >> ~/.ssh/authorized_keys"
ssh user@hostname "echo `cat ~/.ssh/id_rsa.pub` >> ~/.ssh/authorized_keys"

Setting Firewall

Service

$ sudo systemctl disable firewalld
$ sudo systemctl stop firewalld
$ sudo systemctl disable NetworkManager
$ sudo systemctl stop NetworkManager
$ sudo systemctl enable network
$ sudo systemctl start network

Zone

sudo firewall-cmd --get-zones
sudo firewall-cmd --get-active-zones
sudo firewall-cmd --get-default-zone
sudo firewall-cmd --get-services
sudo firewall-cmd --list-all
sudo firewall-cmd --list-ports

Zone-home

sudo firewall-cmd --zone=home --list-all
sudo firewall-cmd --zone=home --list-ports
sudo firewall-cmd --zone=home --list-services

Setting

sudo firewall-cmd --set-default-zone=home
sudo firewall-cmd --zone=home --change-interface=eth0
sudo firewall-cmd --zone=home --add-service=http
sudo firewall-cmd --zone=home --add-port=80/tcp --permanent

New Zone "boxblue"

sudo firewall-cmd --permanent --new-zone=boxblue
sudo firewall-cmd --permanent --zone=boxblue --add-service=ssh
sudo firewall-cmd --permanent --zone=boxblue --add-service=http
sudo firewall-cmd --permanent --zone=boxblue --add-service=https
sudo firewall-cmd --permanent --zone=boxblue --add-port=80/tcp
sudo firewall-cmd --permanent --zone=boxblue --add-port=22/tcp
sudo firewall-cmd --permanent --zone=boxblue --change-interface=wlp0s19f2u1
sudo firewall-cmd --permanent --set-default-zone=boxblue

Update

sudo firewall-cmd --reload
sudo systemctl restart network
sudo systemctl reload firewalld