{"id":88,"date":"2022-11-29T19:53:17","date_gmt":"2022-11-29T11:53:17","guid":{"rendered":"https:\/\/www.yyaan.top\/?p=88"},"modified":"2022-11-29T19:53:18","modified_gmt":"2022-11-29T11:53:18","slug":"%e7%94%b2%e9%aa%a8%e6%96%87amd-arm-%e7%8e%af%e5%a2%83%e5%8d%87%e7%ba%a7dd%e7%b3%bb%e7%bb%9f%e8%84%9a%e6%9c%ac%e4%bb%a3%e7%a0%81","status":"publish","type":"post","link":"https:\/\/www.yyaan.com\/?p=88","title":{"rendered":"\u7532\u9aa8\u6587Amd\/Arm \u73af\u5883\u5347\u7ea7&amp;DD\u7cfb\u7edf\u811a\u672c\u4ee3\u7801"},"content":{"rendered":"\n<p>\u7cfb\u7edf\u5b89\u88c5\u73af\u5883\u5347\u7ea7<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Centos7\/8\u7cfb\u7edf\nyum -y install wget yum update -y &amp;&amp; yum install curl \u2013y\nUbuntu20.04\u7cfb\u7edf\napt-get install wget   \u000bapt-get update -y &amp;&amp; apt-get install curl -y<\/code><\/pre>\n\n\n\n<p><strong>centos7\/8 \u9632\u706b\u5899\u76f8\u5173\u547d\u4ee4<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>**#\u8fdb\u7a0b\u4e0e\u72b6\u6001\u76f8\u5173**\nsystemctl start firewalld.service            #\u542f\u52a8\u9632\u706b\u5899\nsystemctl stop firewalld.service             #\u505c\u6b62\u9632\u706b\u5899\nsystemctl status firewalld                   #\u67e5\u770b\u9632\u706b\u5899\u72b6\u6001\nsystemctl enable firewalld                   #\u8bbe\u7f6e\u9632\u706b\u5899\u968f\u7cfb\u7edf\u542f\u52a8\nsystemctl disable firewalld                  #\u7981\u6b62\u9632\u706b\u5899\u968f\u7cfb\u7edf\u542f\u52a8\nfirewall-cmd --state                         #\u67e5\u770b\u9632\u706b\u5899\u72b6\u6001\nfirewall-cmd --reload                        #\u66f4\u65b0\u9632\u706b\u5899\u89c4\u5219\nfirewall-cmd --list-ports                    #\u67e5\u770b\u6240\u6709\u6253\u5f00\u7684\u7aef\u53e3\nfirewall-cmd --list-services                 #\u67e5\u770b\u6240\u6709\u5141\u8bb8\u7684\u670d\u52a1\nfirewall-cmd --get-services                  #\u83b7\u53d6\u6240\u6709\u652f\u6301\u7684\u670d\u52a1\n\n**#\u533a\u57df\u76f8\u5173**\nfirewall-cmd --list-all-zones                    #\u67e5\u770b\u6240\u6709\u533a\u57df\u4fe1\u606f\nfirewall-cmd --get-active-zones                  #\u67e5\u770b\u6d3b\u52a8\u533a\u57df\u4fe1\u606f\nfirewall-cmd --set-default-zone=public           #\u8bbe\u7f6epublic\u4e3a\u9ed8\u8ba4\u533a\u57df\nfirewall-cmd --get-default-zone                  #\u67e5\u770b\u9ed8\u8ba4\u533a\u57df\u4fe1\u606f\n\n**#\u63a5\u53e3\u76f8\u5173**\nfirewall-cmd --zone=public --add-interface=eth0          #\u5c06\u63a5\u53e3eth0\u52a0\u5165\u533a\u57dfpublic\nfirewall-cmd --zone=public --remove-interface=eth0       #\u4ece\u533a\u57dfpublic\u4e2d\u5220\u9664\u63a5\u53e3eth0\nfirewall-cmd --zone=default --change-interface=eth0      #\u4fee\u6539\u63a5\u53e3eth0\u6240\u5c5e\u533a\u57df\u4e3adefault\nfirewall-cmd --get-zone-of-interface=eth0                #\u67e5\u770b\u63a5\u53e3eth0\u6240\u5c5e\u533a\u57df\n\n**#\u7aef\u53e3\u63a7\u5236**\nfirewall-cmd --query-port=8080\/tcp                         #\u67e5\u8be2\u7aef\u53e3\u662f\u5426\u5f00\u653e\nfirewall-cmd --add-port=8080\/tcp --permanent               #\u6c38\u4e45\u6dfb\u52a08080\u7aef\u53e3\u4f8b\u5916(\u5168\u5c40)\nfirewall-cmd --remove-port=8800\/tcp --permanent            #\u6c38\u4e45\u5220\u96648080\u7aef\u53e3\u4f8b\u5916(\u5168\u5c40)\nfirewall-cmd --add-port=65001-65010\/tcp --permanent        #\u6c38\u4e45\u589e\u52a065001-65010\u4f8b\u5916(\u5168\u5c40)\nfirewall-cmd  --zone=public --add-port=8080\/tcp --permanent          #\u6c38\u4e45\u6dfb\u52a08080\u7aef\u53e3\u4f8b\u5916(\u533a\u57dfpublic)\nfirewall-cmd  --zone=public --remove-port=8080\/tcp --permanent       #\u6c38\u4e45\u5220\u96648080\u7aef\u53e3\u4f8b\u5916(\u533a\u57dfpublic)\nfirewall-cmd  --zone=public --add-port=65001-65010\/tcp --permanent   #\u6c38\u4e45\u589e\u52a065001-65010\u4f8b\u5916(\u533a\u57dfpublic)\n<\/code><\/pre>\n\n\n\n<p><strong>Arm-Ubuntu20\u9632\u706b\u5899\u5f00\u653e\u6307\u5b9a\u7aef\u53e3<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo iptables -I INPUT -s 0.0.0.0\/0 -p tcp --dport 58900 -j ACCEPT\nsudo iptables -I INPUT -s 0.0.0.0\/0 -p tcp --dport 80 -j ACCEPT\nsudo iptables -I INPUT -s 0.0.0.0\/0 -p tcp --dport 443 -j ACCEPT\nsudo iptables -I INPUT -s 0.0.0.0\/0 -p tcp --dport 22 -j ACCEPT\nsudo iptables-save\nsudo apt-get update\nsudo apt-get install iptables-persistent -y\nsudo netfilter-persistent save\nsudo netfilter-persistent reload\napt update &amp;&amp; apt dist-upgrade -y &amp;&amp; apt autoremove -y\n\n# ubuntu\u9632\u706b\u5899\u5f00\u653e\u6240\u6709\u7aef\u53e3\nsudo iptables -I INPUT -s 0.0.0.0\/0 -p tcp --dport 1:65535 -j ACCEPT\nsudo iptables -I INPUT -s 0.0.0.0\/0 -p udp --dport 1:65535 -j ACCEPT\nsudo iptables-save\nsudo ip6tables -I INPUT -s ::\/0 -p tcp --dport 1:65535 -j ACCEPT\nsudo ip6tables -I INPUT -s ::\/0 -p udp --dport 1:65535 -j ACCEPT\nsudo ip6tables-save\napt update &amp;&amp; apt dist-upgrade -y\nsudo apt-get install iptables-persistent -y\nsudo netfilter-persistent save\nsudo netfilter-persistent reload\n# ubuntu\u5220\u9664\u9632\u706b\u5899\nsudo iptables -P INPUT ACCEPT\nsudo iptables -P FORWARD ACCEPT\nsudo iptables -P OUTPUT ACCEPT\nsudo iptables -F\nsudo apt-get purge netfilter-persistent\n\n# \n\n\u5220\u9664iptables\u89c4\u5219\nsudo rm -rf \/etc\/iptables &amp;&amp; reboot<\/code><\/pre>\n\n\n\n<h6 class=\"wp-block-heading\">\u81ea\u5b9a\u4e49\u89c4\u5219<\/h6>\n\n\n\n<pre class=\"wp-block-code\"><code>ufw enable #\u9700\u8981\u8f93\u5165Y\u786e\u8ba4\nufw allow 22\/tcp #\u5f00\u653e22\/tcp\u7aef\u53e3\nufw allow 80,443\/tcp #\u5f00\u653e80\/tcp\u548c443\/tcp\u7aef\u53e3\nufw allow 1234\/udp #\u5f00\u653e1234\/udp\u7aef\u53e3\nufw reload #\u91cd\u8f7d\u9632\u706b\u5899<\/code><\/pre>\n\n\n\n<h6 class=\"wp-block-heading\">Arm-Ubuntu20\u9632\u706b\u5899\u5168\u90e8\u7aef\u53e3\u5f00\u653e<\/h6>\n\n\n\n<pre class=\"wp-block-code\"><code>iptables -D INPUT -j REJECT --reject-with icmp-host-prohibited\niptables -D FORWARD -j REJECT --reject-with icmp-host-prohibited\n\/etc\/init.d\/netfilter-persistent save\n\/etc\/init.d\/netfilter-persistent reload<\/code><\/pre>\n\n\n\n<p><strong>root\u6743\u9650\u4fee\u6539\u5bc6\u7801\u767b\u5f55<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>#!\/bin\/bash\necho root:bbrios520 |sudo chpasswd root\nsudo sed -i 's\/^#\\?PermitRootLogin.*\/PermitRootLogin yes\/g' \/etc\/ssh\/sshd_config;\nsudo sed -i 's\/^#\\?PasswordAuthentication.*\/PasswordAuthentication yes\/g' \/etc\/ssh\/sshd_config;\nsudo service sshd restart\n<\/code><\/pre>\n\n\n\n<p><strong>Arm-bbr\u5f00\u542f<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>echo \"net.core.default_qdisc=fq\" &gt;&gt; \/etc\/sysctl.conf\necho \"net.ipv4.tcp_congestion_control=bbr\" &gt;&gt; \/etc\/sysctl.conf\nsysctl -p\n<\/code><\/pre>\n\n\n\n<p><strong>Arm\u6d4b\u901f\u811a\u672c<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>wget -qO- git.io\/superbench.sh | bash\n<\/code><\/pre>\n\n\n\n<p><strong>\u4e4c\u73ed\u56fe18.0.0\u7cfb\u7edfDD-debian10<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>apt-get update\napt-get install -y xz-utils openssl gawk file\nmkdir \/etc\/network\/interfaces.d\n<\/code><\/pre>\n\n\n\n<p>\u590d\u5236\u4ee5\u4e0b\u6574\u6bb5\u4ee3\u7801<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>echo \"# This file describes the network interfaces available on your system\n# and how to activate them. For more information, see interfaces(5).\n\nsource \/etc\/network\/interfaces.d\/*\n\n# The loopback network interface\nauto lo\niface lo inet loopback\n\n# The primary network interface\nallow-hotplug ens3\niface ens3 inet dhcp\n\n\" &gt; \/etc\/network\/interfaces\n<\/code><\/pre>\n\n\n\n<p>\u4e0b\u97622\u6761\u4ee3\u7801<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>wget --no-check-certificate -qO InstallNET.sh 'https:\/\/moeclub.org\/attachment\/LinuxShell\/InstallNET.sh' &amp;&amp; chmod a+x InstallNET.sh\n\nbash &lt;(wget --no-check-certificate -qO- 'https:\/\/moeclub.org\/attachment\/LinuxShell\/InstallNET.sh') -d 9 -v 64 -a -firmware<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>\u7cfb\u7edf\u5b89\u88c5\u73af\u5883\u5347\u7ea7 centos7\/8 \u9632\u706b\u5899\u76f8\u5173\u547d\u4ee4 Arm-Ubuntu20\u9632\u706b\u5899\u5f00\u653e\u6307\u5b9a\u7aef\u53e3 \u81ea [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-88","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.yyaan.com\/index.php?rest_route=\/wp\/v2\/posts\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yyaan.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yyaan.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yyaan.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yyaan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=88"}],"version-history":[{"count":1,"href":"https:\/\/www.yyaan.com\/index.php?rest_route=\/wp\/v2\/posts\/88\/revisions"}],"predecessor-version":[{"id":89,"href":"https:\/\/www.yyaan.com\/index.php?rest_route=\/wp\/v2\/posts\/88\/revisions\/89"}],"wp:attachment":[{"href":"https:\/\/www.yyaan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yyaan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yyaan.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}