Thanks, glad you like this My aim is indeed to help others either learn what I've picked up over the years in IT, but IT is constantly evolving and so I want to share what I'm now learning myself
SSH uses port 22, so if you want to limit that type of traffic, you can use something like this sudo ufw limit proto tcp from 172.16.18.10 to 172.16.17.10 port 22 This will limit SSH access from a device with an IP of 172.16.18.10 and only to the interface with an IP of 172.16.17.10 If the computer only has one interface you can shorten that to sudo ufw limit proto tcp from 172.16.18.10 to any port 22 And if you want to limit access from an entire /24 subnet it would then be sudo ufw limit proto tcp from 172.16.18.0/24 to any port 22
@@TechTutorialsDavidMcKoneThank you so much now I feel more secured setting limit proto tcp from xxx to any port 22 and even limit CUPS as well that could be a jumper hahaha.
@@TechTutorialsDavidMcKoneare you familiar to something like Zorin Connect or something similar and should we limit it as well since it can be a vulnerability as well. I am new to Linux switched over from Windows and no looking back.
@@pjcpspn670 I don't use it but a limit applies to an application that uses authentication to connect. The computer would see several attempts to connect that fail and the limit option would then block access from that IP for a short while to slow down dictionary attacks for instance
Every computer should have a personal firewall...for Linux you can use its uncomplicated firewall
Thank you so much for simplifying all the topics . Your videos are very crisp and to the point.
Glad to hear you found this video useful
I really enjoy your channel. Thanks for all the informative content.
I really appreciate the feedback. And it's great to hear this has been useful
You are the new DJ Ware!!
Thanks, glad you like this
My aim is indeed to help others either learn what I've picked up over the years in IT, but IT is constantly evolving and so I want to share what I'm now learning myself
I know this is 2yrs ago but can I limit SSH even if not in my ufw app list like some do have
SSH uses port 22, so if you want to limit that type of traffic, you can use something like this
sudo ufw limit proto tcp from 172.16.18.10 to 172.16.17.10 port 22
This will limit SSH access from a device with an IP of 172.16.18.10 and only to the interface with an IP of 172.16.17.10
If the computer only has one interface you can shorten that to
sudo ufw limit proto tcp from 172.16.18.10 to any port 22
And if you want to limit access from an entire /24 subnet it would then be
sudo ufw limit proto tcp from 172.16.18.0/24 to any port 22
@@TechTutorialsDavidMcKoneThank you now I feel more secured that my Linux PCs are secured limiting from xxx to xxx proto tcp port 22.
@@TechTutorialsDavidMcKoneThank you so much now I feel more secured setting limit proto tcp from xxx to any port 22 and even limit CUPS as well that could be a jumper hahaha.
@@TechTutorialsDavidMcKoneare you familiar to something like Zorin Connect or something similar and should we limit it as well since it can be a vulnerability as well. I am new to Linux switched over from Windows and no looking back.
@@pjcpspn670 I don't use it but a limit applies to an application that uses authentication to connect. The computer would see several attempts to connect that fail and the limit option would then block access from that IP for a short while to slow down dictionary attacks for instance
Top notch..
Good to the know the video was helpful
Thanks
Good to know the video was helpful