Creating Automatic Python Firewall Script in Ubuntu
In this video you will use a Python script on Ubuntu to manage automatic firewall entries on and AWS hosted Ubuntu system. You standard AWS system group will allow SSH traffic in and really has to, allowing remote management and access. By opening up SSH there will be many scripted attacks on your system . Although we could use products like fail2-ban, automating the protection yourself helps you learn and manage your system better.
Additionally you can find my video courses on Pluralsight: http://pluralsight.com/training/Authors/Details/andrew-mallett and take time to see my own site http://www.theurbanpenguin.com
00:00 Introduction
00:30 Demo of the final solution
03:50 View problem on new system
05:01 Start editing python script
08:55 Run first draft of script
10:23 Add regular expression to search for IP addresses
14:30 Run 2nd draft of script
15:12 Enable UFW
16:46 Install pip
17:32 Install pyufw python module
18:20 Add UFW support to script
20:50 Run final script
21:58 Add crontab entry
Видео Creating Automatic Python Firewall Script in Ubuntu канала theurbanpenguin
Additionally you can find my video courses on Pluralsight: http://pluralsight.com/training/Authors/Details/andrew-mallett and take time to see my own site http://www.theurbanpenguin.com
00:00 Introduction
00:30 Demo of the final solution
03:50 View problem on new system
05:01 Start editing python script
08:55 Run first draft of script
10:23 Add regular expression to search for IP addresses
14:30 Run 2nd draft of script
15:12 Enable UFW
16:46 Install pip
17:32 Install pyufw python module
18:20 Add UFW support to script
20:50 Run final script
21:58 Add crontab entry
Видео Creating Automatic Python Firewall Script in Ubuntu канала theurbanpenguin
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Python Qotd Network Client For Linux](https://i.ytimg.com/vi/vW6qN9k8Wnc/default.jpg)
![Creating a Python DHCP Client to Test DHCP Responses on the Network](https://i.ytimg.com/vi/y-fkeKEVW3w/default.jpg)
![Starting Using grep in Linux](https://i.ytimg.com/vi/WvcY-mn5XRM/default.jpg)
![Using awk in Linux to create arrays and count in use login shells](https://i.ytimg.com/vi/ewaRg11z7-4/default.jpg)
![Find Duplicate Files In Linux With Awk In Under A Minute!](https://i.ytimg.com/vi/wj7NPnKRh44/default.jpg)
![How To Use Podman Containers](https://i.ytimg.com/vi/piwcpd_hWn0/default.jpg)
![Linux Command Line History Guru](https://i.ytimg.com/vi/_4ikq3uSTRE/default.jpg)
![Understanding Shells: Linux Sub Shells vs Child Shells](https://i.ytimg.com/vi/JG4MW7nUqiY/default.jpg)
![Change directories in ease in BASH using the CDPATH variable](https://i.ytimg.com/vi/6U4XV4w8qtE/default.jpg)
![Unmasking the Linux Umask](https://i.ytimg.com/vi/zsgtQ9BMrPM/default.jpg)
![Learn to Create your own custom sudoers Entries in Linux](https://i.ytimg.com/vi/jHZHW7pPYjY/default.jpg)
![Setting the Correct Permissions on Linux Mountpoints](https://i.ytimg.com/vi/hgGP_5y3OWE/default.jpg)
![Using Firewalld Ipsets to Block Hackers on Rocky Linux 8.6](https://i.ytimg.com/vi/MWQqjSHpIVo/default.jpg)
![Using sed to Insert and Delete Lines in Linux Text File](https://i.ytimg.com/vi/LWB71ouayYg/default.jpg)
![Managing Password Complexity in Ubuntu 20.04](https://i.ytimg.com/vi/jPJiFI88RXs/default.jpg)
![Understanding Zombie Processes in Linux](https://i.ytimg.com/vi/g3QPerQSeW0/default.jpg)
![Install Kubernetes MicroK8s Using Ansible on Ubuntu 20.04](https://i.ytimg.com/vi/a2j1py7w8uk/default.jpg)
![MySQL 8 Using JOINS and VIEWS to Simplify and Secure Data Access.](https://i.ytimg.com/vi/0UCjbi1LLd4/default.jpg)
![Install MySQL 8 Using Ansible on Vagrant AlmaLinux 8 System](https://i.ytimg.com/vi/yHwTU-E_iPI/default.jpg)
![Use Vagrant to Deploy Any Ansible Playbook to Install Terraform or Any Tooling You Choose](https://i.ytimg.com/vi/k5RIR6bcQ6g/default.jpg)