{"id":10362,"date":"2024-08-30T15:12:27","date_gmt":"2024-08-30T12:12:27","guid":{"rendered":"https:\/\/www.inetmar.com\/blog\/?p=10362"},"modified":"2024-08-30T15:23:06","modified_gmt":"2024-08-30T12:23:06","slug":"linux-port-acma-kapama-islemi-nasil-yapilir","status":"publish","type":"post","link":"https:\/\/www.inetmar.com\/blog\/linux-port-acma-kapama-islemi-nasil-yapilir\/","title":{"rendered":"Linux Port A\u00e7ma-Kapama \u0130\u015flemi Nas\u0131l Yap\u0131l\u0131r?"},"content":{"rendered":"<p>Linux sunucunuz sanal d\u00fcnyaya a\u00e7\u0131lan bir kap\u0131d\u0131r e\u011fer bu kap\u0131lar\u0131 do\u011fru y\u00f6netmezseniz istenmeyen misafirler evinize girebilir. Bug\u00fcn sizlere sunucunuzun kap\u0131lar\u0131 olan portlar\u0131 nas\u0131l koruyaca\u011f\u0131n\u0131z\u0131 ve sadece g\u00fcvendi\u011finiz misafirlere nas\u0131l izin verece\u011finizden bahsedece\u011fiz.<\/p>\n<h2><strong>Port Nedir? Ne \u0130\u015fe Yarar?<\/strong><\/h2>\n<p>Bir bilgisayar a\u011f\u0131 \u00fczerinden veri al\u0131\u015fveri\u015fi yap\u0131l\u0131rken portlar ileti\u015fimin y\u00f6nlendirilmesinde rol oynar. Her port belirli bir hizmetin veya uygulaman\u0131n ileti\u015fim kurdu\u011fu bir numaral\u0131 kap\u0131d\u0131r. \u00d6rne\u011fin web serverlar genellikle 80 veya 443 numaral\u0131 portlar \u00fczerinden \u00e7al\u0131\u015f\u0131r. Bu \u015fekilde portlar trafi\u011fin do\u011fru hizmete y\u00f6nlendirilmesini sa\u011flar. Portlar hakk\u0131nda daha fazla bilgi i\u00e7in <a href=\"https:\/\/www.inetmar.com\/blog\/port-nedir-ve-ne-ise-yarar\/\" target=\"_blank\" rel=\"noopener\">Port Nedir ve Ne \u0130\u015fe Yarar?<\/a> makalemizi inceleyebilirsiniz.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10379\" src=\"https:\/\/www.inetmar.com\/blog\/wp-content\/uploads\/2024\/08\/lnx-300x171.webp\" alt=\"Linux Port A\u00e7ma-Kapama \" width=\"747\" height=\"425\" \/>Projeleriniz i\u00e7in <a href=\"https:\/\/www.inetmar.com\/sunucu\/\" target=\"_blank\" rel=\"noopener\">kiral\u0131k sunucu<\/a> hizmetlerimizi inceleyin.<\/p>\n<h2><strong>Linux Port A\u00e7ma-Kapama \u0130\u015flemi<\/strong><\/h2>\n<p>Linuxta port a\u00e7ma ve kapama i\u015flemi birka\u00e7 farkl\u0131 y\u00f6ntemle ger\u00e7ekle\u015ftirebilir. Sizlerde a\u015fa\u011f\u0131daki y\u00f6ntemlerden da\u011f\u0131t\u0131m\u0131n\u0131za uygun olan\u0131 se\u00e7erek linux i\u015fletim sistemine sahip sunucunuzda port a\u00e7ma i\u015flemi ve linux port kapama i\u015flemi yapabilirsiniz.<\/p>\n<h2><strong>UFW ile Port Y\u00f6netimi<\/strong><\/h2>\n<h3><strong>UFW Kurulumu<\/strong><\/h3>\n<p>UFW (Uncomplicated Firewall) kullan\u0131m\u0131 basit firewall arac\u0131d\u0131r. UFW ile kolayl\u0131kla port a\u00e7\u0131p kapayabilirsiniz. UFW genellikle varsay\u0131lan olarak kurulu gelir. Kurulu de\u011filse a\u015fa\u011f\u0131daki komut ile kurabilirsiniz.<\/p>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">apt-get install ufw<br \/>\n<\/code><\/div>\n<\/div>\n<h3><strong>UFW ile Port A\u00e7ma<\/strong><\/h3>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">ufw allow 22\/tcp<br \/>\n<\/code><\/div>\n<\/div>\n<p>Bu komut TCP protokol\u00fcn\u00fc kullanarak 22 numaral\u0131 portu a\u00e7ar. (E\u011fer udp protokol\u00fc kullanmak istiyorsan\u0131z 22\/tcp yerine port\/udp yazabilirsiniz.)<\/p>\n<h3><strong>UFW ile Port Kapama<\/strong><\/h3>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">ufw deny 80\/tcp<br \/>\n<\/code><\/div>\n<\/div>\n<p>Bu komut belirtilen 80 numaral\u0131 port \u00fczerinden gelen trafi\u011fi engeller.<\/p>\n<h2><strong>iptables ile Port Y\u00f6netimi<\/strong><\/h2>\n<h3><strong>iptables ile Port A\u00e7ma<\/strong><\/h3>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">iptables -A INPUT -p tcp --dport 443 -j ACCEPT<br \/>\n<\/code><\/div>\n<\/div>\n<p>Bu komut gelen trafi\u011fi 443 numaral\u0131 port \u00fczerinden kabul eder. (E\u011fer udp protokol\u00fc kullanmak istiyorsan\u0131z -p tcp yerine -p udp yazabilirsiniz.)<\/p>\n<h3><strong>iptables ile Port Kapama<\/strong><\/h3>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">iptables -D INPUT -p tcp --dport 443 -j ACCEPT<br \/>\n<\/code><\/div>\n<\/div>\n<p>Bu komut belirtilen 443 portu \u00fczerinden gelen trafi\u011fi engeller.<\/p>\n<h2><strong>firewalld ile Port Y\u00f6netimi<\/strong><\/h2>\n<h3><strong>firewalld ile Port A\u00e7ma<\/strong><\/h3>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">firewall-cmd --permanent --add-port=80\/tcp<br \/>\n<\/code><\/div>\n<\/div>\n<p>Bu komut 80 numaral\u0131 portu TCP protokol\u00fc \u00fczerinden kal\u0131c\u0131 olarak a\u00e7ar. De\u011fi\u015fikliklerin aktif olmas\u0131 i\u00e7in <code>firewalld<\/code> hizmetini yeniden ba\u015flatman\u0131z gerekebilir:<\/p>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">firewall-cmd --reload<br \/>\n<\/code><\/div>\n<\/div>\n<h3><strong>firewalld ile Port Kapama<\/strong><\/h3>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">firewall-cmd --permanent --remove-port=80\/tcp<br \/>\n<\/code><\/div>\n<\/div>\n<p>Bu komut 80 numaral\u0131 portu kal\u0131c\u0131 olarak kapat\u0131r. De\u011fi\u015fikliklerin uygulanmas\u0131 i\u00e7in <code class=\"!whitespace-pre hljs language-bash\">firewall-cmd --reload<\/code> komutu ile hizmeti yeniden ba\u015flatabilirsiniz.<\/p>\n<h2><strong>Gereksiz Portlar\u0131 Kapatman\u0131n \u00d6nemi<\/strong><\/h2>\n<p>A\u00e7\u0131k olan her port potansiyel bir g\u00fcvenlik riski ta\u015f\u0131r, bu nedenle yaln\u0131zca gerekli hizmetler i\u00e7in kullan\u0131lan portlar\u0131 a\u00e7\u0131k b\u0131rakmak sunucunuzun g\u00fcvenli\u011fini art\u0131racakt\u0131r.<\/p>\n<h2><strong>A\u00e7\u0131k Portlar\u0131 Kontrol Etme<\/strong><\/h2>\n<p>Sunucuzdaki a\u00e7\u0131k portlar\u0131 kontrol etmek i\u00e7in <code>nmap<\/code> arac\u0131 ile a\u015fa\u011f\u0131daki komutu uygulayarak a\u00e7\u0131k portlar\u0131 taray\u0131p listeleyebilirsiniz. Bu \u015fekilde yukar\u0131da yapt\u0131\u011f\u0131n\u0131z i\u015flemlerin ger\u00e7ekle\u015fip ger\u00e7ekle\u015fmedi\u011fini kontrol edebilirsiniz.<\/p>\n<div class=\"dark bg-gray-950 contain-inline-size rounded-md border-[0.5px] border-token-border-medium\">\n<div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"!whitespace-pre hljs language-bash\">nmap -sT -O localhost<\/code><\/div>\n<\/div>\n<h2><strong>S\u0131k\u00e7a Sorulan Sorular<\/strong><\/h2>\n<h3><strong>Hangi Portlar Genellikle A\u00e7\u0131k Olmal\u0131d\u0131r?<\/strong><\/h3>\n<p>Genellikle SSH (22), HTTP (80), ve HTTPS (443) portlar\u0131 a\u00e7\u0131k b\u0131rak\u0131l\u0131r. Ancak sizler ihtiyac\u0131n\u0131za g\u00f6re bu portlar\u0131 d\u00fczenleyebilirsiniz.<\/p>\n<h3><strong>Port Y\u00f6netimi ile \u0130lgili En \u0130yi Ara\u00e7lar Hangileridir?<\/strong><\/h3>\n<p><strong>UFW, iptables<\/strong> ve <strong>firewalld<\/strong> gibi ara\u00e7lar, Linux\u2019ta port y\u00f6netimi i\u00e7in en yayg\u0131n kullan\u0131lan ara\u00e7lard\u0131r. Bunlar\u0131n d\u0131\u015f\u0131nda <strong>nmap<\/strong> gibi port tarama ara\u00e7lar\u0131 da portlar\u0131n durumunu kontrol etmek i\u00e7in kullan\u0131l\u0131r.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux sunucunuz sanal d\u00fcnyaya a\u00e7\u0131lan bir kap\u0131d\u0131r e\u011fer bu kap\u0131lar\u0131 do\u011fru y\u00f6netmezseniz istenmeyen misafirler evinize girebilir. Bug\u00fcn sizlere sunucunuzun kap\u0131lar\u0131 olan portlar\u0131 nas\u0131l koruyaca\u011f\u0131n\u0131z\u0131 ve sadece g\u00fcvendi\u011finiz misafirlere nas\u0131l izin verece\u011finizden bahsedece\u011fiz. Port Nedir? Ne&#46;&#46;&#46;<\/p>\n","protected":false},"author":2,"featured_media":10384,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52,11],"tags":[],"class_list":["post-10362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik","category-linux"],"_links":{"self":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts\/10362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/comments?post=10362"}],"version-history":[{"count":25,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts\/10362\/revisions"}],"predecessor-version":[{"id":10391,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts\/10362\/revisions\/10391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/media\/10384"}],"wp:attachment":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/media?parent=10362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/categories?post=10362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/tags?post=10362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}