Advertisements
Skip to content

How To Configure SSH Security In Redhat Enterprise Linux Rhel-4&5

Our Score
Click to rate this post!
[Total: 0 Average: 0]

In This Tutorial We Are Going To Learn How To Configure SSH Security In Redhat Enterprise Linux Rhel-4&5

Before Configuring This SSH Security You Must Have Configure SSH Server In Your Linux Machine

So Firstly If You Don’t Know How To Configure SSH Server Then By Clicking This LInk You Can Learn How To Configure SSH Server In Redhat Linux

How To Configure SSH Server In Redhat Linux

So Here Is The Command Of Configuring SSH Security

Firstly Login With The Root In Linux And After Login First Thing Is You Have To Run This Commands To Create User In Linux

Here I Am Creating Users In Linux

#useradd U1               {For Creating User In Linux}
#Passwd U1                {After Then Give The Password To The User}

#useradd U2               {For Creating User In Linux}
#Passwd U2                {After Then Give The Password To The User}

#useradd U3               {For Creating User In Linux}
#Passwd U3                 {After Then Give The Password To The User}

 

 

After Creating The User Now Here Is The Command Of Configuring SSH Security

#vim /etc/ssd/sshd_config              {This Is The Configuration File Of SSH Server And We Have To Do Some Changes Inside This Conf File}

#service ssh restart

#chkconfig on

#iptables -F

#setenforce = 0

Here Is The Picture You can See What Changes We Have To Do Inside This Configuration File

 

#PermitRootLogin  no   {After This You Cannot Login With The Root To Ssh Server}

#PermitEmptyPassword No #Banner  /root/a.txt

AllowUser  U1 U2     {If You Login With The User U1&U2 It Will Login To Ssh Server} DenyUser  U3            {If You Login To Ssh Server To User U3 So It Will Not Login To Ssh Because We Denied The User U3}

Now If You Login In SSH Through User U1 & U2 So It Will Login Automatically Now If You Want To Login With User U3 So You can’t Login With The User Because We Deny The User U3 In Configuration File As You Can See Before

This Is All How To Configure SSH Security In Redhat Enterprise linux So Now Follow Thse Simple Steps And Configure By Yourself

Advertisements

Leave a Reply

Discount Offer

Now Get 50% Discount

On Cyber Security Training                                                       Notes  

Click here  To Purchase

%d bloggers like this: