|
|
分两种情况
, A) U6 m. p3 N) {. V3 E2 @; A6 t) W一种是恶意登录的0 a" l' h$ Y/ I* z B& T
3 }- S& h- o0 h2 h: `: Z一种是恶意扫描端口的% S- a9 g. {" S: k" Z/ @- H
* K' c& s6 }% x8 a
firewall-cmd --permanent --add-rich-rule="rule family=ipv4 source address=你的IP地址 reject"/ [; \7 Y" R! L* G9 m
5 M& ], J; f( z- c. L5 b
# D$ ?/ I. T; \( D! ?$ r' E0 tfirewall-cmd reload0 ?% B, g0 b7 @- I8 y3 t% z1 U
|
|