Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:veos:installation [2024/09/26 15:29] – external edit 127.0.0.1 | en:veos:installation [2025/10/31 09:09] (current) – elena.krasnobryzh | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| * [[en: | * [[en: | ||
| - | * [[en: | + | * [[en: |
| - | * [[en:dpi:dpi_components:qoestor:install_and_update: | + | * [[en:dpi:qoe_analytics:implementation_administration:requirements|QoE requirements]] |
| :!: If any discrepancies are found at this stage, contact [[en: | :!: If any discrepancies are found at this stage, contact [[en: | ||
| ===== ISO Links ===== | ===== ISO Links ===== | ||
| - | | + | |
| [[en: | [[en: | ||
| Line 107: | Line 107: | ||
| - Save the password for **vasexpertsmnt**. | - Save the password for **vasexpertsmnt**. | ||
| - Set permission for users of the wheel group to use all commands on behalf of all users, for this you need to add to /// | - Set permission for users of the wheel group to use all commands on behalf of all users, for this you need to add to /// | ||
| - | - To provide remote access via SSH and set restrictions on valid IP addresses from the list: < | + | - To provide remote access via SSH and set restrictions on valid IP addresses from the list: < |
| < | < | ||
| - | iptables -A INPUT -m conntrack --ctstate RELATED, ESTABLISHED -j ACCEPT | + | < |
| - | iptables -A INPUT -p tcp -s 45.151.108.0/ | + | iptables -A INPUT -m conntrack --ctstate RELATED, |
| - | iptables -A INPUT -p tcp -s 94.140.198.64/ | + | iptables -A INPUT -p tcp -s 45.151.108.0/ |
| - | iptables -A INPUT -p tcp -s 78.140.234.98 | + | iptables -A INPUT -p tcp -s 94.140.198.64/ |
| - | iptables -A INPUT -p tcp -s 193.218.143.187 | + | iptables -A INPUT -p tcp -s 193.218.143.187 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 93.100.47.212 | + | iptables -A INPUT -p tcp -s 93.100.73.160 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 93.100.73.160 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp -s 78.140.234.98 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 77.247.170.134 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp -s 93.159.236.11 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 91.197.172.2 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp -s 46.243.181.35 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 46.243.181.242 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp -s 46.243.181.242 -m tcp --dport 22 -j ACCEPT |
| - | iptables -A INPUT -p tcp -s 93.159.236.11 -m tcp --dport 22 -j ACCEPT | + | iptables -A INPUT -p tcp --dport 22 -j DROP |
| - | iptables -A INPUT -p tcp --dport 22 -j DROP | + | service iptables save |
| - | service iptables save | + | |
| </ | </ | ||
| If you are using firewalld: | If you are using firewalld: | ||
| < | < | ||
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --permanent --zone=public --add-rich-rule=' |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --zone=public --remove-service=ssh --permanent |
| - | firewall-cmd --permanent --zone = public --add-rich-rule = 'rule family = " | + | firewall-cmd --reload |
| - | firewall-cmd --zone = public --remove-service = ssh --permanent | + | |
| - | firewall-cmd --reload | + | |
| </ | </ | ||
| **!Save your settings as the server will be rebooted during installation!** \\ | **!Save your settings as the server will be rebooted during installation!** \\ | ||