{"id":135,"date":"2021-05-26T11:55:00","date_gmt":"2021-05-26T11:55:00","guid":{"rendered":"https:\/\/dillonfletcher.co.uk\/?p=135"},"modified":"2021-05-26T11:55:00","modified_gmt":"2021-05-26T11:55:00","slug":"hardening-your-network","status":"publish","type":"post","link":"https:\/\/dillonfletcher.co.uk\/?p=135","title":{"rendered":"Hardening your network"},"content":{"rendered":"\n<p>Recently, I&#8217;ve been looking into how to improve my networks security. I have come up with 3 simple ways to easily improve your networks security:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-9a9a6107-be61-4f4d-8d40-1910e0eea05c\">1. Setting up an SSH jumpbox<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"726\" height=\"357\" src=\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png\" alt=\"\" class=\"wp-image-141\"\/><figcaption>Diagram of how SSH connections will work<\/figcaption><\/figure>\n\n\n\n<p id=\"block-6b1a875d-ab73-4714-8daf-d174d7208ff1\">One of the only points into my network is via SSH into my web server, this server kind of acts as a jump box already, as I can SSH into my other Linux hosts via password auth, but this isn&#8217;t very secure. After some research, I found it was common to have a dedicated Linux host whos only purpose is to &#8220;jump&#8221; to other machines.<\/p>\n\n\n\n<p id=\"block-bdbe0b85-3c82-4083-afcd-305f4ea64b3e\">So I started by spinning up a virtual machine, with 1 core, 4GB of RAM and 16GB of storage, running Ubuntu Server 20.04.2LTS, plenty of power for this purpose.<\/p>\n\n\n\n<p id=\"block-9cf9dba8-a453-435e-9067-d01f17bba6a9\">From there, I assigned a static IP and SSH&#8217;d in on my computer on the same network.<\/p>\n\n\n\n<p id=\"block-a676e196-6611-4414-9527-789883f2e08a\">Now I&#8217;m going to go through some important setup.<\/p>\n\n\n\n<p id=\"block-a094ee8e-857b-4e29-a4d7-8f27dfd06a0e\">First, on your local machine, run:<\/p>\n\n\n\n<pre id=\"block-9670f037-fd02-415b-8c87-893be7774f37\" class=\"wp-block-code\"><code>$ ssh-keygen<\/code><\/pre>\n\n\n\n<p id=\"block-e0d56df5-decb-4883-bd99-a4053fa96c3d\">This will create 2 files in &#8220;~\/.ssh\/&#8221;, these are your public and private keys. <strong>Do not let your private key leave this computer.<\/strong> With this key, people will be able to access your jump box, think of it as a long, fancy password.<\/p>\n\n\n\n<p id=\"block-6d992a3a-e5b8-4f22-9394-3b51f79174c6\">Now on your jump box, we need to add your public key, make sure you are not logged in as root, and preferably make a user without sudo for security. (However, you will need root\/sudo for this setup, im assuming you have two separate, non-root users, one with sudo, and one without.)<\/p>\n\n\n\n<p id=\"block-a2301cae-a003-44f9-adab-745825ae4483\">Now you need to paste the contents of &#8220;~\/.ssh\/id_rsa.pub&#8221; from your local computer to &#8220;~\/.ssh\/authorized_keys&#8221; on your jump box.<\/p>\n\n\n\n<p id=\"block-421242aa-b709-4e39-8464-9ab884d2d3a0\">First, on your local computer, run:<\/p>\n\n\n\n<pre id=\"block-f9d569fc-0122-4b2e-b7bc-e3e9254f5622\" class=\"wp-block-code\"><code>$ cat ~\/.ssh\/id_rsa.pub<\/code><\/pre>\n\n\n\n<p id=\"block-e2f59551-8dc8-4c28-b2f3-31ec928665ef\">Copy the output of this, and on your jump box run:<\/p>\n\n\n\n<pre id=\"block-569929e4-57b4-4bf4-b17f-009bb7fdfa84\" class=\"wp-block-code\"><code>$ vim ~\/.ssh\/authorized_keys<\/code><\/pre>\n\n\n\n<p id=\"block-20e60816-e2f4-486e-b88c-c1c2fa188bbb\">This will open a file in vim, you can paste keys on each line, and each key will let you into the server, so I will be repeating the above steps for both my laptop, desktop, and phone (<a href=\"https:\/\/www.f-droid.org\/en\/packages\/org.sufficientlysecure.termbot\/\">Termbot<\/a> SSH client).<\/p>\n\n\n\n<p id=\"block-2857beca-604a-4fc4-b84b-c91cd82c6100\">Once you are done, save the file and then on the jump box, run:<\/p>\n\n\n\n<pre id=\"block-43f6aeb2-5584-4e1b-b2b3-321c17cc008c\" class=\"wp-block-code\"><code>$ sudo vim \/etc\/ssh\/sshd_config<\/code><\/pre>\n\n\n\n<p id=\"block-eee621b1-aece-42bf-aed7-ba7d48fec2f5\">In this file, make these edits:<\/p>\n\n\n\n<pre id=\"block-f5778c68-42e9-4781-8cc4-0463d41ca50c\" class=\"wp-block-code\"><code># Change<br>#PermitRootLogin prohibit-password<br># to<br>PermitRootLogin no<br># and change<br>#PasswordAuthentication yes<br># to<br>PasswordAuthentication no<br>\ufeff<\/code><\/pre>\n\n\n\n<p id=\"block-d9581811-ebfd-494f-8298-ed8a39b0a6f8\">This prevents the root user logging in via SSH, and makes it so that we can only login using the keys we added earlier.<\/p>\n\n\n\n<p id=\"block-5779c3ed-de11-4997-b2b7-8875147ff455\">Now run:<\/p>\n\n\n\n<pre id=\"block-c0dff2c0-07d7-4828-bccb-ee9bb8cd5763\" class=\"wp-block-code\"><code>$ sudo systemctl restart sshd<\/code><\/pre>\n\n\n\n<p id=\"block-a3d5ecc4-5458-47e6-b934-cd75945a6586\">This restarts SSH, enabling the changes we just made.<\/p>\n\n\n\n<p id=\"block-18bf0688-091b-4756-9e0d-7840c47f249d\">If you want, you can also install fail2ban, this &#8220;bans&#8221; IPs from accessing SSH after 3 failed attempts. This isn&#8217;t as neccesary with pubkey authentication, but we are trying to make everything as secure as possible, so, you can do this by running:<\/p>\n\n\n\n<pre id=\"block-37be10e1-214e-4b5d-93b6-9667ac8e6cfe\" class=\"wp-block-code\"><code>$ sudo apt update<br>$ sudo apt install fail2ban<br>$ sudo systemctl start fail2ban<\/code><\/pre>\n\n\n\n<p id=\"block-a0054d7a-bb97-4c36-a35e-b3784a6a8484\">Now that everything is secured on the actual authentication side of things, we can forward our SSH port to the internet. Depending on your router\/firewall, this process can differ, but it usually consists of finding a page called &#8220;port forwarding,&#8221; and forwarding port 22 to the IP address of your server, i&#8217;m running OPNsense, and the process is as follows:<\/p>\n\n\n\n<p>Copy the output of this, and on your jump box run:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ vim ~\/.ssh\/authorized_keys<\/code><\/pre>\n\n\n\n<p>This will open a file in vim, you can paste keys on each line, and each key will let you into the server, so I will be repeating the above steps for both my laptop, desktop, and phone (<a href=\"https:\/\/www.f-droid.org\/en\/packages\/org.sufficientlysecure.termbot\/\">Termbot<\/a> SSH client). <\/p>\n\n\n\n<p>Once you are done, save the file and then on the jump box, run:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo vim \/etc\/ssh\/sshd_config<\/code><\/pre>\n\n\n\n<p>In this file, make these edits:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Change\n#PermitRootLogin prohibit-password\n# to\nPermitRootLogin no\n# and change\n#PasswordAuthentication yes\n# to\nPasswordAuthentication no\n<\/code><\/pre>\n\n\n\n<p>This prevents the root user logging in via SSH, and makes it so that we can only login using the keys we added earlier.<\/p>\n\n\n\n<p>Now run:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo systemctl restart sshd<\/code><\/pre>\n\n\n\n<p>This restarts SSH, enabling the changes we just made.<\/p>\n\n\n\n<p>If you want, you can also install fail2ban, this &#8220;bans&#8221; IPs from accessing SSH after 3 failed attempts. This isn&#8217;t as neccesary with pubkey authentication, but we are trying to make everything as secure as possible, so, you can do this by running:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo apt update\n$ sudo apt install fail2ban\n$ sudo systemctl start fail2ban\n$ sudo systemctl enable fail2ban<\/code><\/pre>\n\n\n\n<p>Now that everything is secured on the actual authentication side of things, we can forward our SSH port to the internet. Depending on your router\/firewall, this process can differ, but it usually consists of finding a page called &#8220;port forwarding,&#8221; and forwarding port 22 to the IP address of your server, i&#8217;m running OPNsense, and the process is as follows:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Login to your router\/firewalls web interface. This is usually the same format as your computers local IP, but with a &#8220;1&#8221; on the end, my subnet is &#8220;192.168.55.0\/24&#8221; so my web interface is located at &#8220;https:\/\/192.168.55.1&#8221;. Now login, and find the port forwarding page <\/li><li>Add a rule\/port forward. Press the add button and fill in the correct info for your port forward, mine is as follows:<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1247\" height=\"860\" src=\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/image.png\" alt=\"\" class=\"wp-image-139\"\/><\/figure>\n\n\n\n<p>Now save the rule, and you should now able to access your jump box from outside of your network.<\/p>\n\n\n\n<p>Now we need to actually harden the jump box itself. I&#8217;m going to start by upgrading all packages:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo apt update\n$ sudo apt upgrade\n# Reboot for good measure\n$ sudo reboot<\/code><\/pre>\n\n\n\n<p>When the system comes back up, reconnect, and we need to start adding SSH keys to the servers you want to jump to.<\/p>\n\n\n\n<p>So, for example, on my webhost server, I open the authorized_keys file:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo vim ~\/.ssh\/authorized_keys<\/code><\/pre>\n\n\n\n<p>In this file, I paste the contents of ~\/.ssh\/id_rsa.pub from the jump server, effictively what we are trying to do is restrict ALL SSH traffic to the jump server. The jump server acts as a CNC (&#8220;command and control&#8221;) server for all other servers and computers running SSH.<\/p>\n\n\n\n<p>Now we edit the SSH config, the same way as before, disabling password and root login.<\/p>\n\n\n\n<p>After that, you should restrict SSH connections to the jumpbox. So open the file &#8220;\/etc\/hosts.deny&#8221;:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo vim \/etc\/hosts.deny<\/code><\/pre>\n\n\n\n<p>Add the following:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># \/etc\/hosts.deny\nsshd: ALL<\/code><\/pre>\n\n\n\n<p>And now we allow just the jump server:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo vim \/etc\/hosts.allow<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code># \/etc\/hosts.allow\nsshd: 192.168.55.250\/24\n# Your subnet and IP may differ<\/code><\/pre>\n\n\n\n<p>Now only your jump server can connect, and only with the private key that is on the jump server. Repeat this process for as many servers as you please.<\/p>\n\n\n\n<p>I&#8217;m now going to add a few firewall rules, which stop the jump server from connecting to the internet entirely, and again restricts SSH connections to only the jump server. I&#8217;m not going to show this as it differs from firewall to firewall and would take up too much space in this article!<\/p>\n\n\n\n<p>And thats it for this step! A few notes:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>For added security, close the SSH port on your firewall and instead add a VPN, which sole purpose is to allow you connect to the jump server.<\/li><li>If you haven&#8217;t already figured it out, the only way to connect to other servers via SSH is through the jump server via SSH, this means that you create a &#8216;tunnel&#8217; through the jump server.<\/li><li>Ideally, if you know you wont need to access the server from the outside, you can close the SSH port, or you can add a schedule on your firewall to open and close your port at certain times of the day, you could even use <a href=\"https:\/\/help.ubuntu.com\/community\/PortKnocking\">port knocking<\/a> to make a &#8220;secret knock&#8221; to open the port temprarily remotely.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">2. Intrusion Detection and Intrusion Prevention<\/h2>\n\n\n\n<p>Ok, this one is completely unneccesary for home networks, but it is a really useful tool in a business environment. First i&#8217;m going to gloss over and explain what an IDS and IPS is.<\/p>\n\n\n\n<p><strong>Intrusion Detection System (IDS):<\/strong><\/p>\n\n\n\n<p>An Intrusion Detection System, first of all, does not serve the same purpose as a firewall, most of the time the IDS lives on the firewall, which can add to the functionality of your firewall, but it is not a firewall in itself.<\/p>\n\n\n\n<p>An IDS&#8217;s purpose is to analyze and detect malicious traffic. It usually does this by checking packet signatures against a list of rules which are known to be malicious traffic.<\/p>\n\n\n\n<p><strong>Intrusion Prevention System (IPS):<\/strong><\/p>\n\n\n\n<p>An Intrusion Prevention System does everything an IDS does, but also prevents intrusion by usually blocking source and\/or destination IP addresses. Most IDS&#8217;s have an &#8220;IPS&#8221; mode which can be enabled.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Setup:<\/strong><\/p>\n\n\n\n<p>To setup my IPS, I&#8217;m going to be installing <a href=\"https:\/\/suricata-ids.org\/\">suricata<\/a> on my existing <a href=\"https:\/\/opnsense.org\/\">OPNsense<\/a> firewall. I chose suricata because of it&#8217;s multithreaded performance, due to all that packet analysis, an IDS\/IPS can slow your network down (especially on my older PowerEdge R610 server, due to its poor single thread performance!) However, thanks to multi-threading there is no difference with suricata, I still get my full 150\/30 bandwidth performance. However, I also recommend <a href=\"https:\/\/snort.org\/snort3\">snort<\/a>, which just newly introduced threading too in its latest version.<\/p>\n\n\n\n<p>So first, I installed the suricata package from the official OPNsense repository:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1518\" height=\"43\" src=\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/image-1.png\" alt=\"\" class=\"wp-image-146\"\/><\/figure>\n\n\n\n<p> After installation, go to &#8220;Services -&gt; Intrusion Detection -&gt; Administration&#8221; and choose your desired settings, mine are as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"881\" height=\"437\" src=\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/image-2.png\" alt=\"\" class=\"wp-image-147\"\/><\/figure>\n\n\n\n<p>Now go to &#8220;Download&#8221; and choose the rule sets you wish to download, I&#8217;m not going to go over this though, however I highly recommend <a href=\"https:\/\/www.youtube.com\/watch?v=7gZYbIr_Qj4\">this video<\/a> for explanation and <a href=\"https:\/\/www.youtube.com\/watch?v=KRlbkG9Bh6I\">this video<\/a> for in-depth setup by Lawrence Systems on YouTube.<\/p>\n\n\n\n<p>After you are done, head over to alerts, and you will see a log of all alerts that have been triggered, 99.99% of the time these are going to be bots which are attemptint to access your network. Its even picking up on inbound ports which aren&#8217;t even open!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1558\" height=\"443\" src=\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/image-3.png\" alt=\"\" class=\"wp-image-148\"\/><\/figure>\n\n\n\n<p>And that&#8217;s it for Network Intrusion Detection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Patch Everything!<\/h2>\n\n\n\n<p>This one of the most important things you can do, especially with internet facing systems like firewalls or any systems with services exposed. Patching isn&#8217;t hard to do, takes little time and prevents people gaining access to your network via known exploits. I&#8217;m not going to go through how to patch or update everything because you likely already know how to.<\/p>\n\n\n\n<p>You can find if software you are running is vulnerable on <a href=\"https:\/\/www.cvedetails.com\/\">https:\/\/www.cvedetails.com\/<\/a>. For example, Apache has had 1457 known CVE&#8217;s since 1999 at the time of writing. You can see that DoS vulnerabilities are the most common, followed by Code Execution! This is also why you never run services as root, if an attacker were to find an RCE exploit in apache, they would be dropped into whatever user apache is running as, hopefully for them they will get lucky and the administrator setup Apache to run as root, which means they don&#8217;t have to do any more exploitation after gaining a foothold.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1098\" height=\"799\" src=\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/05\/image.png\" alt=\"\" class=\"wp-image-152\"\/><\/figure>\n\n\n\n<p>Thats it for this post, thank you for reading, and remember to keep your systems secure!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, I&#8217;ve been looking into how to improve my networks security. I have come up with 3 simple ways to easily improve your networks security: 1. Setting up an SSH jumpbox One of the only points into my network is via SSH into my web server, this server kind of acts as a jump box [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-135","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hardening your network - Dillon Fletcher<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dillonfletcher.co.uk\/?p=135\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hardening your network - Dillon Fletcher\" \/>\n<meta property=\"og:description\" content=\"Recently, I&#8217;ve been looking into how to improve my networks security. I have come up with 3 simple ways to easily improve your networks security: 1. Setting up an SSH jumpbox One of the only points into my network is via SSH into my web server, this server kind of acts as a jump box [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dillonfletcher.co.uk\/?p=135\" \/>\n<meta property=\"og:site_name\" content=\"Dillon Fletcher\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-26T11:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dillonfletcher.co.uk\/?p=135\",\"url\":\"https:\/\/dillonfletcher.co.uk\/?p=135\",\"name\":\"Hardening your network - Dillon Fletcher\",\"isPartOf\":{\"@id\":\"https:\/\/dillonfletcher.co.uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dillonfletcher.co.uk\/?p=135#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dillonfletcher.co.uk\/?p=135#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png\",\"datePublished\":\"2021-05-26T11:55:00+00:00\",\"author\":{\"@id\":\"https:\/\/dillonfletcher.co.uk\/#\/schema\/person\/93633b34164a44661bb41e8a436d5535\"},\"breadcrumb\":{\"@id\":\"https:\/\/dillonfletcher.co.uk\/?p=135#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dillonfletcher.co.uk\/?p=135\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dillonfletcher.co.uk\/?p=135#primaryimage\",\"url\":\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png\",\"contentUrl\":\"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png\",\"width\":726,\"height\":357},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dillonfletcher.co.uk\/?p=135#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dillonfletcher.co.uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hardening your network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dillonfletcher.co.uk\/#website\",\"url\":\"https:\/\/dillonfletcher.co.uk\/\",\"name\":\"Dillon Fletcher - Personal Site\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dillonfletcher.co.uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dillonfletcher.co.uk\/#\/schema\/person\/93633b34164a44661bb41e8a436d5535\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dillonfletcher.co.uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7711d63308d3f4b9ce89cffa22159871b500b5bf670d38c80d828722cf42006a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7711d63308d3f4b9ce89cffa22159871b500b5bf670d38c80d828722cf42006a?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/dillonfletcher.co.uk\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hardening your network - Dillon Fletcher","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dillonfletcher.co.uk\/?p=135","og_locale":"en_US","og_type":"article","og_title":"Hardening your network - Dillon Fletcher","og_description":"Recently, I&#8217;ve been looking into how to improve my networks security. I have come up with 3 simple ways to easily improve your networks security: 1. Setting up an SSH jumpbox One of the only points into my network is via SSH into my web server, this server kind of acts as a jump box [&hellip;]","og_url":"https:\/\/dillonfletcher.co.uk\/?p=135","og_site_name":"Dillon Fletcher","article_published_time":"2021-05-26T11:55:00+00:00","og_image":[{"url":"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dillonfletcher.co.uk\/?p=135","url":"https:\/\/dillonfletcher.co.uk\/?p=135","name":"Hardening your network - Dillon Fletcher","isPartOf":{"@id":"https:\/\/dillonfletcher.co.uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dillonfletcher.co.uk\/?p=135#primaryimage"},"image":{"@id":"https:\/\/dillonfletcher.co.uk\/?p=135#primaryimage"},"thumbnailUrl":"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png","datePublished":"2021-05-26T11:55:00+00:00","author":{"@id":"https:\/\/dillonfletcher.co.uk\/#\/schema\/person\/93633b34164a44661bb41e8a436d5535"},"breadcrumb":{"@id":"https:\/\/dillonfletcher.co.uk\/?p=135#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dillonfletcher.co.uk\/?p=135"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dillonfletcher.co.uk\/?p=135#primaryimage","url":"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png","contentUrl":"https:\/\/dillonfletcher.co.uk\/wp-content\/uploads\/2021\/03\/jump.png","width":726,"height":357},{"@type":"BreadcrumbList","@id":"https:\/\/dillonfletcher.co.uk\/?p=135#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dillonfletcher.co.uk\/"},{"@type":"ListItem","position":2,"name":"Hardening your network"}]},{"@type":"WebSite","@id":"https:\/\/dillonfletcher.co.uk\/#website","url":"https:\/\/dillonfletcher.co.uk\/","name":"Dillon Fletcher - Personal Site","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dillonfletcher.co.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dillonfletcher.co.uk\/#\/schema\/person\/93633b34164a44661bb41e8a436d5535","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dillonfletcher.co.uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7711d63308d3f4b9ce89cffa22159871b500b5bf670d38c80d828722cf42006a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7711d63308d3f4b9ce89cffa22159871b500b5bf670d38c80d828722cf42006a?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/dillonfletcher.co.uk"]}]}},"_links":{"self":[{"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=135"}],"version-history":[{"count":10,"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/135\/revisions"}],"predecessor-version":[{"id":153,"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/135\/revisions\/153"}],"wp:attachment":[{"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dillonfletcher.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}