bruteforce protection howto

Mihamina Rakotomandimby mihamina at gulfsat.mg
Tue Mar 23 14:05:34 UTC 2010


> Franz Waldmüller <waldbauernbub at gmx.at> :
> I agree with the other posters,

Yes, but it's not enough: The logs are analyzed on a different host
(the "logger").

How would you suggest to update he "router"setting _from_ the "logger".

Using SSH with key authentication would be one solution:
http://bashcurescancer.com/run_remote_commands_with_ssh.html
http://wiki.mikrotik.com/wiki/Use_SSH_to_execute_commands_(DSA_key_login)
http://www.cyberciti.biz/tips/distributed-administration-using-ssh.html


-- 
       Architecte Informatique chez Blueline/Gulfsat:
    Administration Systeme, Recherche & Developpement
                +261 34 29 155 34 / +261 33 11 207 36




More information about the ubuntu-users mailing list