In this guide i have going to talk about how to set up a SSH Reverse proxy. What is a Reverse SSH Proxy. An SSH Reverse Proxy, is where you have a server behind a firewall that you want to access with out the need for port forwarding on routers and firewall. you simply tell…
Tag: SSH
How To setup SSH Key Authentication on Linux
This short tutorial explains how to setup SSH to use key based authentication, by default on CentOS this is disabled. To start with follow our guide on how to generate SSH key pairs and copy the key over. Configure SSH to enable Public Key Based Authentication Open up /etc/sshd_config in vi and find the following…
Simple way to protect asterisk from being hacked… FAIL2BAN…..
Introduction This guide will detail how to install fail2ban on a centos 32bit system with asterisk installed. It is intended to allow you to add an extra level of protection from your asterisk PBX from being hacked. Fail2ban will guard against most services such as SSH and SMTP however this guide will concentrate on protecting asterisk The…
Keeping your traffic safe in public places with SSH Tunneling…
Using OpenSSH on a Linux/Unix system you can tunnel all of the traffic from your local box to a remote box that you have an account on. For example I tunnel all of my outbound E-mail traffic back to my personal server to avoid having to change SMTP servers, use SMTP-AUTH, etc. when I am behind…