7 Easy Steps to Change ssh port number in Linux(RedHat/CentOS 7)
In this article, I will take you through the steps to change default ssh port number in Linux. ssh is known as secure shell which is used to establish connection with remote host securely on default ssh port number 22. Sometimes due to some security reason or to stop any kind of brute force attacks, you want to change the default port to some another port.
This can be easily achieved by changing the ssh port number in ssh configuration file. We will now go ahead and check the steps to change the default port below.
Change SSH Port Number
Also Read: 8 Popular Linux cp command Examples for Professionals
1. Change SSH Port Number in sshd_config
First, you need to change the ssh port number
/etc/ssh/sshd_config file to some free port say
4800 in this case. Please make sure that selected port is free and not being used in any other services.
[[email protected] ~]# vi /etc/ssh/sshd_config Port 4800
Now you can press
Esc. Then save and exit by using
wq! . This will save the file and exit out.
2. Restart sshd service
Once ssh port number is changed, you need to restart sshd service using
systemctl restart sshd command for the changes to reflect.
[[email protected] ~]# systemctl restart sshd
or, you can also restart your sshd service through traditional way by running
service sshd restart command.
[[email protected] ~]# service sshd restart Redirecting to /bin/systemctl restart sshd.service
3. Check sshd service status
Now you can check the sshd service status by using
systemctl status sshd command. As you can see from below output, sshd service is running from past 1 min 7 s and server is listening on Port 4800.
[[email protected] ~]# systemctl status sshd ● sshd.service - OpenSSH server daemon Loaded: loaded (/usr/lib/systemd/system/sshd.service; enabled; vendor preset: enabled) Active: active (running) since Sat 2020-03-28 05:09:06 EST; 1min 7s ago Docs: man:sshd(8) man:sshd_config(5) Main PID: 3758 (sshd) CGroup: /system.slice/sshd.service └─3758 /usr/sbin/sshd -D Mar 28 05:09:06 znode3 systemd: Starting OpenSSH server daemon... Mar 28 05:09:06 znode3 sshd: Server listening on :: port 4800. Mar 28 05:09:06 znode3 systemd: Started OpenSSH server daemon. Mar 28 05:09:06 znode3 sshd: Server listening on 0.0.0.0 port 4800.
Port 22in sshd_config, it will be a good idea to add another
Port 4800in next line to open both Port 22 and 4800 in case something goes wrong with the configuration and you lose the ssh connection of the remote system. This is specially needs to be taken care when the Server is geographically separated and you don’t have physical access of the remote server.
4. Check selinux status
Now you need to check the selinux status by running
sestatus command to make sure it will not be blocking any requests. As you can see from below output, current mode is set to permissive which means it will not enforce any selinux policies but will only show the warnings. You can also disable selinux if you want to completely switch it off. You can refer to Best Way to Disable SELinux on CentOS/RedHat 7 to know more about disabling SELinux.
[[email protected] ~]# sestatus SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: permissive Mode from config file: permissive Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max kernel policy version: 31
You can also disable SELinux by setting
SELinux=disabled as you can see below.
[[email protected] ~]# cat /etc/selinux/config SELINUX=disabled
ESC and then
wq! to save and exit.
5. Restart your system
For the selinux policy to take effect, you need to reboot your system using
init 6 command once.
[[email protected] ~]# init 6
or, you can also run
reboot command to restart your system.
[[email protected] ~]# reboot
6. Allow port 4800 through your firewall
You also need to allow ssh
Port 4800 from firewall to allow the connections on this port.
[[email protected] ~]# firewall-cmd --permanent --add-port=4800/tcp success
Sometimes it might happen that you do not want firewalld service running and you want to stop it completely. In that case you can stop the service by running
systemctl stop firewalld command as shown below.
[[email protected] ~]# systemctl stop firewalld
Check Firewalld Status. Now you can notice that firewalld service went to Inactive state and hence not running.
[[email protected] ~]# systemctl status firewalld ● firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled) Active: inactive (dead) since Sat 2020-03-28 05:23:27 EST; 25s ago Docs: man:firewalld(1) Process: 5715 ExecStart=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS (code=exited, status=0/SUCCESS) Main PID: 5715 (code=exited, status=0/SUCCESS) Mar 28 05:18:48 localhost systemd: Starting firewalld - dynamic firewall daemon... Mar 28 05:18:49 localhost systemd: Started firewalld - dynamic firewall daemon. Mar 28 05:18:50 localhost firewalld: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -D FORWARD -i docker0 -o ...ain?). Mar 28 05:18:50 localhost firewalld: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -D FORWARD -i docker0 -o ...ain?). Mar 28 05:23:24 localhost systemd: Stopping firewalld - dynamic firewall daemon... Mar 28 05:23:27 localhost systemd: Stopped firewalld - dynamic firewall daemon.
Port 4800is open and allowed through IPTABLES also in case IPTABLES is active in your system. If it is not allowed, you can check 30 Most Popular IPTABLES Command in Linux to allow this port through IPTABLES firewall.
7. Check port connection
Now you can try to telnet ssh
Port 4800 from another system and check if the ssh port is open or not. As you can see from below output, ssh
Port 4800 is now open and getting connected remotely.
[[email protected] ~]# telnet 192.168.0.110 4800 Trying 192.168.0.110... Connected to 192.168.0.110. Escape character is '^]'. SSH-2.0-OpenSSH_7.4