1 |
hostnamectl set-hostname hostname |
2 |
systemctl reload sshd_config |
3 |
systemctl enable sshd_config |
4 |
systemctl disable sshd_config |
5 |
timedatectl -set-zone UTC |
6 |
useradd -m -g wheel -u 3003 ingener |
7 |
semanage port -a -t ssh_port_t -p tcp 22022 |
8 |
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="45.151.108.4/32" port port=22022 protocol="tcp" accept' |
9 |
firewall-cmd --reload |
10 |
systemctl reload sshd |
11 |
shutdown -r now |
12 |
storcli /call show all |
13 |
dnf update -y |
14 |
dnf install -y vim-enhanced sudo mc git gcc openssl-devel wget sysstat setroubleshoot lvm2 epel-release vsftpd chrony |
15 |
useradd -m -s /sbin/nologin cdr |
16 |
openssl rand -base64 32 |
17 |
passwd cdr |
18 |
systemctl enable vsftpd |
19 |
systemctl start vsftpd |
20 |
cat /home/*/.ssh/authorized_keys |
21 |
cat /root/.ssh/authorized_keys |
22 |
cat /home/ingener/.ssh/authorized_keys |
23 |
PermitRootLogin no |
24 |
PasswordAuthentication no |
25 |
service sshd restart |
26 |
chage -W 90 root |
27 |
firewall-cmd --state |
28 |
firewall-cmd --list-all |
29 |
systemctl status firewalld |
30 |
dnf install fail2ban |
31 |
/etc/passwd | grep bash |
32 |
netstat -anlp | grep listen |
33 |
systemctl enable oim-trapd |
34 |
firewall-cmd --direct --get-all-rules |
35 |
/etc/dpi/fastpcrf.conf |
36 |
ip addr | grep inet |
37 |
yum -y install policycoreutils-python-utils |
38 |
iptables -t nat -A PREROUTING -d 50.100.150.200/32 -p tcp -m tcp --dport 11111 -j DNAT --to-destination 100.150.200.250:23456 |
Комментарии