In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
This article uses easy-to-understand examples to introduce how to do security configuration for CVM. The content is very detailed. Interested friends can use it for reference. I hope it will be helpful to you.
For CVM, different systems may have different security configuration operations. Here we introduce the security policy settings of Windows CVM.
1. Open "run" on the start menu or open "run" on the keyboard WIN+R, type "secpol.msc" and press the "OK" button to open it.
two。 Click "IP Security Policy". If you want to disable attacking IP access, click Action-Select create IP Security Policy, and pop up the next step of the IP Security Policy Wizard.
3. Fill in the name and description of the IP security policy, uncheck it, and click finish next.
4. Pop-up edit properties dialog box, pay attention to the "add wizard" at the bottom right, if checked, cancel and click "add".
5. Click "add" to pop up the ip filter list, use the add wizard to tick off, and click "add".
6.ip filter attribute-address. The source address is the attack ip, and the destination address is the local ip. Don't write it upside down.
7. Click OK to save, go back to the previous interface, select "filter Action", check it out using the add wizard, and click "add".
8. Select Block, change the name in General, click OK to select Block, change the name in General, click OK to select the filter you just added, and click apply
9. Click OK and remember to return to the local security policy interface, right-assign. At this point, users who attack ip addresses will not be able to access the CVM.
This is the end of how to configure the security of the CVM. I hope the above content can be helpful to you and learn more. If you think the article is good, you can share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.