Virtual server setting

本文探讨了H3C ER3100路由器的基本设置,包括通过特定配置实现Internet上的服务器访问、设置VPN连接、理解Trunk功能、配置QoS以及家庭网络对服务器的访问。同时提到了DDoS和ARP攻击防范,以及动态域名解析服务——花生壳的应用。

背景:今天我主要是想架设一个可以在internet上访问的服务器,然后
研究了我们公司的H3C ER3100路由器。

1.具说通过以下设置我可以在internet上访问我们公司的服务器;今天我用手机不行,我今天晚上回去用我们家试试。
在这里插入图片描述
2.这里可以设置VPN;但是客户端用什么工具来连接;
在这里插入图片描述
3.这里有一个trunk设置,然后就是虚拟网络可以互访的一个东西;到底是什么,我也没有用过;
在这里插入图片描述
4.这里可以设置QOS,它是网络访问一个优先顺序;我现在还没有把服务器搞好;所以这个我后面再来研究;
在这里插入图片描述
5.这里就是设置我在家里可以访问我们的server;
在这里插入图片描述

DDOS攻击:中文名叫分布式拒绝服务,意思就是分布在各地的server攻击你的主机,让你的主机没办法访问;

ARP攻击:就是让局域网瘫痪;冒充假的ARP;
花生壳:是动态域名解析服务客户端软件。当您安装并注册该项服务,无论您在任何地点、任何时间、使用任何线路,均可利用这一服务建立拥有固定域名和最大自主权的互联网主机

### Nginx Server Tokens Configuration Directive Purpose and Usage The `server_tokens` directive controls whether Nginx includes information about its version number in error pages, the "Server" response header field, and other messages sent to a client. This can be useful for security purposes as hiding this information makes it more difficult for attackers to identify which web server software is being used. To configure the `server_tokens` directive within an Nginx configuration file: 1. Open the main Nginx configuration file or any included site-specific configuration files. 2. Add or modify the following line under either http, server, or location context blocks depending on where you want to apply these settings: ```nginx server_tokens off; ``` This setting disables outputting of detailed server version numbers when responding to requests from clients[^1]. For example, placing this inside the HTTP block will ensure that all virtual hosts served by this instance do not expose their versions unless explicitly overridden elsewhere: ```nginx http { ... server_tokens off; server { listen 80; root /usr/share/nginx/html; index index.html index.htm; location / { try_files $uri $uri/ =404; } } } ``` When enabled (which is default behavior), responses might look like so: ``` Server: nginx/1.18.0 ``` With `server_tokens off`, only generic identification remains visible: ``` Server: nginx ``` Disabling tokens reduces potential attack vectors but does little harm since most attacks are based on vulnerabilities present regardless of specific versions running. --related questions-- 1. How does disabling server_tokens improve website security? 2. What contexts can the server_tokens directive be placed into within the Nginx config structure? 3. Are there scenarios where revealing the exact Nginx version could benefit system administrators? 4. Can similar configurations hide details of other services such as PHP-FPM alongside Nginx?
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值