of the Linux system. You may not know what the 22 port is. The 22 port is the ssh port. PcAnywhere establishes TCP and the connection of this port may be to find ssh. This port can be modified, but many people under Linux do not know the method, today introduce two methods for everyone.
The first one:
01 If you want to change the default port of SSH (22), then you only need to modify: Port 22 in /etc/ssh/sshd_config, here change 22 to yourself Set the port on the line, but do not set the same port as the existing one, in case of unknown consequences.
02 If you want to limit the IP of SSH login, you can do the following:
First: modify /etc/hosts.deny, add sshd:ALL
and then: Modify: /etc/hosts.allow, set the following settings: sshd: 192.168.0.241
This will limit the IP of only 192.168.0.241 to log in to the LINUX machine via SSH. Of course, as a server, I don't have gnome and KDE installed, and many don't install it, which increases the security factor.
Second:
First modify the configuration file
vi /etc/ssh/sshd_config
Find the #Port 22 section, here is the default use of the logo Port 22, modified as follows:
Port 22
Port 50000
Then save and exit
Execute /etc/init.d/sshd restart
This way the SSH port will work with both 22 and 50000.
Now edit the firewall configuration: vi /etc/sysconfig/iptables
Enable port 50000.
Execute /etc/init.d/iptables restart
Now use the ssh tool to connect to port 50000 to test for success. If the connection is successful, edit the sshd_config settings again and delete the Port22 inside.
The reason why the two ports are set first, and then the port is closed after the test is successful, in the process of modifying the conf, in the event of an unknown situation such as dropped calls, broken networks, misoperations, etc. It can be debugged through another port connection to prevent the connection from being sent to the computer room, which makes the problem more complicated and troublesome.
The two methods reflect differently. Some people like the first one, some people like the second one. In short, no matter which one can be done, the effect is good, so everyone should try it.
u disk is an indispensable tool in our daily life, but there are some problems in the process of usi
In the process of using the computer, we often use to run various windows. When we are running, the
Environment Description A company has a system, two Windows2003 systems, and the built-in cluster ma
I believe everyone is familiar with QQ, we often use QQ to chat. So how do you create a QQ group? I
Modify the background color of the computer folder
You ask me to answer: Deep analysis of Windows security mode
How to solve the lack of C disk space?
After using IE browser to download files locally, there is no pop-up prompt to notify how to set it?
Method of making X.509 certificate using OpenSSL tool and summary of its precautions
Win7 program is not responding, prawn is quick to help you solve
u disk reloading system error Internal Error 36000 how to solve?
How to solve the problem that the computer resolution cannot be adjusted?
Linux system server error message explanation
How to unlock sleep wakeup password in Win10
Little-known win2008 network management optimization skills
WinXP does not work after setting the screen saver password
Assassin's Creed 2 The third chapter of the plot flow experience Raiders share
Reset and modify the forgotten Windows 7 login password method tutorial
WinXP pure version using CBox playback screen is not complete how to do?
"Win8 system hurts the hard drive" big break