Skip to content
Readerstacks logo Readerstacks
  • Home
  • Softwares
  • Angular
  • Php
  • Laravel
  • Flutter
Readerstacks logo
Readerstacks
ssh disable

Disable SSH or IP bounded on any ubuntu server?

Aman Jain, July 11, 2021February 22, 2024
How to Restrict SSH Access to Specific IP Addresses - Fedingo

Open SSH to everyone is a security risk. we can change these settings easily in 2 minutes. let’s have quick solution on this.

Open file /etc/hosts.deny with using vi or nano editor.

Command : sudo vi /etc/hosts.deny then add below line to the file.

sshd,sshdfwd-X11 : ALL

it will look like above file. it will disable all ssh request.

After this close this file and open another file named as hosts.allow

Command : sudo vi /etc/hosts.allow

sshd : 192.168.0.0/24 // your ip address or client ip address
sshd : 127.0.0.1
sshd : [::1]

You are done. now you only be able to access the server using the defined ip address in server.

Additionally you can restrict SSH access by username as well.

  1. Open the /etc/ssh/sshd_config file usingg vi
    Command : sudo vi /etc/ssh/sshd_config

    PermitRootLogin no
    AllowUsers      user1 user2 user3 etc
    PasswordAuthentication yes

PermitRootLogin no configuration will disable the root login into the server and AllowUsers  will only allow mentioned usernames.

Related

Softwares Devops Ubuntu SecuritySShUbuntu

Post navigation

Previous post
Next post

Related Posts

How to install MySQL in Ubuntu?

September 18, 2021September 18, 2021

MySQL is a most popular and open source relational database. it provides multi user support with a many storage engines. in this tutorial we are going to install MySQL in Ubuntu. Let’s begin with simple steps: Step 1 : Open terminal in Ubuntu and install MySQL package Here, we are…

Read More

How many type of methods in Restful api?

August 28, 2021February 22, 2024

Restful api is very useful today while creating a mobile application or web application. Restful api or Http request methods There is 4 types of method of http request. Post Get Put Delete Patch 1. Post method Post method is widely used to fetch the content of a form or…

Read More
Softwares disable change detection anagular

How to disable automatic change detection strategy in angular component?

July 4, 2021November 8, 2023

In angular all components by default take the changes as any event occur, but sometime we disable automatic change detection strategy in angular. Thus, to detach the two way binding in component we can use changeDetection strategy in component metadata. Angular Change Detection Strategy is simple to implement using the…

Read More

Aman Jain
Aman Jain

With years of hands-on experience in the realm of web and mobile development, they have honed their skills in various technologies, including Laravel, PHP CodeIgniter, mobile app development, web app development, Flutter, React, JavaScript, Angular, Devops and so much more. Their proficiency extends to building robust REST APIs, AWS Code scaling, and optimization, ensuring that your applications run seamlessly on the cloud.

Categories

  • Angular
  • CSS
  • Dart
  • Devops
  • Flutter
  • HTML
  • Javascript
  • jQuery
  • Laravel
  • Laravel 10
  • Laravel 11
  • Laravel 9
  • Mysql
  • Php
  • Softwares
  • Ubuntu
  • Uncategorized

Archives

  • June 2025
  • May 2025
  • April 2025
  • October 2024
  • July 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • July 2023
  • March 2023
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021

Recent Posts

  • The Resilience of Nature: How Forests Recover After Fires
  • Understanding Laravel Cookie Consent for GDPR Compliance
  • Understanding High Vulnerabilities: A Critical Overview of the Week of May 12, 2025
  • Installing a LAMP Stack on Ubuntu: A Comprehensive Guide
  • Understanding High Vulnerabilities: A Deep Dive into Recent Security Concerns
©2023 Readerstacks | Design and Developed by Readerstacks
Go to mobile version