You can customize your firewall in two ways. First, you can select to x
x allow all traffic from certain network interfaces. Second, you can allow x
x certain protocols explicitly through the firewall. Specify additional x
x ports in the form 'service:protocol', such as 'imap:tcp'. x
x Trusted Devices: [*] eth0 x
x Allow incoming: [ ] DHCP [*] SSH [ ] Telnet x
x [*] WWW (HTTP) [ ] Mail (SMTP) [*] FTP x
x Other ports _________________________ x
x x OK x x
# This is a basic ProFTPD configuration file (rename it to
# 'proftpd.conf' for actual use. It establishes a single server
# and a single anonymous login. It assumes that you have a user/group
# "nobody" and "ftp" for normal operation and anon.
ServerName "ProFTPD Default Installation"
# Port 21 is the standard FTP port.
# Umask 022 is a good standard umask to prevent new dirs and files
# from being group and world writable.
# To prevent DoS attacks, set the maximum number of child processes
# to 30. If you need to allow more than 30 concurrent connections
# at once, simply increase this value. Note that this ONLY works
# in standalone mode, in inetd mode you should use an inetd server
# that allows you to limit maximum number of processes per service
# (such as xinetd)
# Set the user and group that the server normally runs at.
# Normally, we want files to be overwriteable.
# A basic anonymous configuration, no upload directories.
# We want clients to be able to login with "anonymous" as well as "ftp"
UserAlias anonymous ftp
# Limit the maximum number of anonymous logins
# We want 'welcome.msg' displayed at login, and '.message' displayed
# in each newly chdired directory.
# Limit WRITE everywhere in the anonymous chroot
<Limit READ WRITE>
Generating public/private rsa1 key pair.
Enter file in which to save the key (/root/.ssh/identity):（回车键）
Enter passphrase (empty for no passphrase):（输入私钥）
Enter same passphrase again:（重输）
AllowHosts *.zist.edu.cn 192.168.1.*
AllowGroups root qxh
#chkconfig --level 345 sshd on