This Gist contains my IPTables rules for securing the Asterisk VoIP server. The "string" module is used to identify legitimate users and block attackers.
Learn how to set up your personal VoIP server
↓ ↓ ↓ Scroll down for the IPTables rules ↓ ↓ ↓
#!/usr/bin/env bash | |
# The MIT License (MIT) | |
# | |
# Copyright (c) 2014 Arun Babu Neelicattu | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy | |
# of this software and associated documentation files (the "Software"), to deal | |
# in the Software without restriction, including without limitation the rights | |
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
This Gist contains my IPTables rules for securing the Asterisk VoIP server. The "string" module is used to identify legitimate users and block attackers.
Learn how to set up your personal VoIP server
↓ ↓ ↓ Scroll down for the IPTables rules ↓ ↓ ↓
This is how you can take an OpenVPN .ovpn config file and extract the certificates/keys required to import the profile into NetworkManager.
[client] | |
ssl | |
ssl-cert=/etc/mysql/client-cert.pem | |
ssl-key=/etc/mysql/client-key.pem | |
[mysqld] | |
ssl | |
ssl-cipher=DHE-RSA-AES256-SHA | |
ssl-ca=/etc/mysql/ca-cert.pem | |
ssl-cert=/etc/mysql/server-cert.pem |