{"id":859,"date":"2023-05-04T23:08:24","date_gmt":"2023-05-04T20:08:24","guid":{"rendered":"https:\/\/cesrey.com\/blog\/?p=859"},"modified":"2023-05-04T23:13:00","modified_gmt":"2023-05-04T20:13:00","slug":"linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi","status":"publish","type":"post","link":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/","title":{"rendered":"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131"},"content":{"rendered":"<p>Linux sunucular\u0131n g\u00fcvenli\u011fi, do\u011fru yap\u0131land\u0131r\u0131lm\u0131\u015f bir g\u00fcvenlik duvar\u0131 ile sa\u011flanabilir. G\u00fcvenlik duvar\u0131, sunucuya gelen ve giden trafi\u011fi kontrol eder ve zararl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flar. Bu makalede, Linux sunucu y\u00f6netimi i\u00e7in g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 hakk\u0131nda bilgi verilecektir.<\/p>\n<h2>G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131<\/h2>\n<p>G\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sunucuya gelen trafi\u011fi kontrol etmek i\u00e7in kullan\u0131lan bir dizi kural ve politikalar\u0131n ayarlanmas\u0131d\u0131r. Bu kural ve politikalar, sunucunun ihtiya\u00e7lar\u0131na g\u00f6re \u00f6zelle\u015ftirilebilir ve y\u00f6netilebilir. G\u00fcvenlik duvar\u0131, sunucuya gelen trafi\u011fi kontrol ederken, \u00f6zellikle a\u011f ba\u011flant\u0131s\u0131 olan sunucularda, sunucudan \u00e7\u0131kan trafi\u011fi de kontrol edebilir.<\/p>\n<h2>G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 \u0130\u00e7in Ad\u0131mlar<\/h2>\n<ol>\n<li>G\u00fcvenlik duvar\u0131 yaz\u0131l\u0131m\u0131 y\u00fckleyin: \u0130lk ad\u0131m, sunucuya uygun bir g\u00fcvenlik duvar\u0131 yaz\u0131l\u0131m\u0131 y\u00fcklemektir. Linux i\u00e7in en pop\u00fcler g\u00fcvenlik duvar\u0131 yaz\u0131l\u0131m\u0131 iptables&#8217;tir. \u0130ptables, Linux \u00e7ekirde\u011fine entegre edilmi\u015ftir ve bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131nda varsay\u0131lan olarak y\u00fckl\u00fcd\u00fcr.<\/li>\n<li>G\u00fcvenlik duvar\u0131 kural ve politikalar\u0131n\u0131 ayarlay\u0131n: G\u00fcvenlik duvar\u0131 kural ve politikalar\u0131, sunucunun ihtiya\u00e7lar\u0131na g\u00f6re \u00f6zelle\u015ftirilmelidir. \u00d6rne\u011fin, web sunucusu i\u00e7in HTTP ve HTTPS portlar\u0131 a\u00e7\u0131k olmal\u0131d\u0131r. Ancak, SSH portu gibi kritik portlar, sadece belirli IP adreslerinden eri\u015filebilir olmal\u0131d\u0131r. Bu kural ve politikalar, iptables komutlar\u0131 kullan\u0131larak ayarlanabilir.<\/li>\n<li>G\u00fcvenlik duvar\u0131n\u0131 etkinle\u015ftirin: G\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 tamamland\u0131ktan sonra, g\u00fcvenlik duvar\u0131n\u0131 etkinle\u015ftirmek i\u00e7in birka\u00e7 ad\u0131m yap\u0131lmas\u0131 gereklidir. \u0130lk olarak, g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rma dosyas\u0131n\u0131 kaydedin. Daha sonra, g\u00fcvenlik duvar\u0131n\u0131 etkinle\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:<\/li>\n<\/ol>\n<pre><code>sudo systemctl enable iptables.service\r\n\r\n<\/code><\/pre>\n<ol>\n<li>G\u00fcvenlik duvar\u0131n\u0131 test edin: G\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 tamamland\u0131ktan sonra, g\u00fcvenlik duvar\u0131n\u0131 test etmek \u00f6nemlidir. Bu test, g\u00fcvenlik duvar\u0131n\u0131n do\u011fru bir \u015fekilde yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131n\u0131 ve sunucunun ihtiya\u00e7lar\u0131na uygun oldu\u011funu do\u011frular. A\u015fa\u011f\u0131daki komutlar\u0131 kullanarak, g\u00fcvenlik duvar\u0131n\u0131 test edebilirsiniz:<\/li>\n<\/ol>\n<pre><code>sudo iptables -L\r\nsudo iptables -L -v\r\n\r\n<\/code><\/pre>\n<h2>Sonu\u00e7<\/h2>\n<p>Linux sunucu y\u00f6netimi i\u00e7in g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sunucular\u0131n g\u00fcvenli\u011fi i\u00e7in \u00f6nemlidir. G\u00fcvenlik duvar\u0131, sunucuya gelen ve giden trafi\u011fi kontrol eder ve zararl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flar. Bu makalede, Linux sunucu y\u00f6netimi i\u00e7in g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 hakk\u0131nda bilgi verilmi\u015ftir. G\u00fcvenlik duvar\u0131 yap\u0131s\u0131, sunucunun ihtiya\u00e7lar\u0131na g\u00f6re \u00f6zelle\u015ftirilebilir ve y\u00f6netilebilir.<\/p>\n<div class=\"newspaper-x-tags\"><strong>TAGS: <\/strong><span><a href=\"https:\/\/cesrey.com\/blog\/tag\/duvari\/\" rel=\"tag\">duvar\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/guvenlik\/\" rel=\"tag\">g\u00fcvenlik<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/icin\/\" rel=\"tag\">i\u00e7in<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/linux\/\" rel=\"tag\">linux<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/sunucu\/\" rel=\"tag\">sunucu<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/yapilandirmasi\/\" rel=\"tag\">yap\u0131land\u0131rmas\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/yonetimi\/\" rel=\"tag\">y\u00f6netimi<\/a> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Linux sunucular\u0131n g\u00fcvenli\u011fi, do\u011fru yap\u0131land\u0131r\u0131lm\u0131\u015f bir g\u00fcvenlik duvar\u0131 ile sa\u011flanabilir. G\u00fcvenlik duvar\u0131, sunucuya gelen ve giden trafi\u011fi kontrol eder ve zararl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flar. Bu makalede, Linux sunucu y\u00f6netimi i\u00e7in g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 hakk\u0131nda bilgi verilecektir. G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 G\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sunucuya gelen trafi\u011fi kontrol etmek i\u00e7in kullan\u0131lan bir dizi kural ve politikalar\u0131n [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":546,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[273,91,182,292,132,220,59],"class_list":["post-859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-duvari","tag-guvenlik","tag-icin","tag-linux","tag-sunucu","tag-yapilandirmasi","tag-yonetimi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog\" \/>\n<meta property=\"og:description\" content=\"Linux sunucular\u0131n g\u00fcvenli\u011fi, do\u011fru yap\u0131land\u0131r\u0131lm\u0131\u015f bir g\u00fcvenlik duvar\u0131 ile sa\u011flanabilir. G\u00fcvenlik duvar\u0131, sunucuya gelen ve giden trafi\u011fi kontrol eder ve zararl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flar. Bu makalede, Linux sunucu y\u00f6netimi i\u00e7in g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 hakk\u0131nda bilgi verilecektir. G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 G\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sunucuya gelen trafi\u011fi kontrol etmek i\u00e7in kullan\u0131lan bir dizi kural ve politikalar\u0131n [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/\" \/>\n<meta property=\"og:site_name\" content=\"Cesrey Web Hosting Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-04T20:08:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-04T20:13:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-cekirdegi-5-6-sona-erdi-linux-cekirdegi-5-7-icin-yukseltme-zamani-geldi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kader Kele\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kader Kele\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/\"},\"author\":{\"name\":\"Kader Kele\u015f\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\"},\"headline\":\"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131\",\"datePublished\":\"2023-05-04T20:08:24+00:00\",\"dateModified\":\"2023-05-04T20:13:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/\"},\"wordCount\":458,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"keywords\":[\"duvar\u0131\",\"g\u00fcvenlik\",\"i\u00e7in\",\"linux\",\"sunucu\",\"yap\u0131land\u0131rmas\u0131\",\"y\u00f6netimi\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/\",\"url\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/\",\"name\":\"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#website\"},\"datePublished\":\"2023-05-04T20:08:24+00:00\",\"dateModified\":\"2023-05-04T20:13:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/cesrey.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cesrey.com\/blog\/#website\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"name\":\"Cesrey Web Hosting Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cesrey.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\",\"name\":\"Cesrey Web Hosting Blog\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"contentUrl\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"width\":1470,\"height\":391,\"caption\":\"Cesrey Web Hosting Blog\"},\"image\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\",\"name\":\"Kader Kele\u015f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"caption\":\"Kader Kele\u015f\"},\"url\":\"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/","og_locale":"tr_TR","og_type":"article","og_title":"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog","og_description":"Linux sunucular\u0131n g\u00fcvenli\u011fi, do\u011fru yap\u0131land\u0131r\u0131lm\u0131\u015f bir g\u00fcvenlik duvar\u0131 ile sa\u011flanabilir. G\u00fcvenlik duvar\u0131, sunucuya gelen ve giden trafi\u011fi kontrol eder ve zararl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flar. Bu makalede, Linux sunucu y\u00f6netimi i\u00e7in g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131 hakk\u0131nda bilgi verilecektir. G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 G\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sunucuya gelen trafi\u011fi kontrol etmek i\u00e7in kullan\u0131lan bir dizi kural ve politikalar\u0131n [&hellip;]","og_url":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/","og_site_name":"Cesrey Web Hosting Blog","article_published_time":"2023-05-04T20:08:24+00:00","article_modified_time":"2023-05-04T20:13:00+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-cekirdegi-5-6-sona-erdi-linux-cekirdegi-5-7-icin-yukseltme-zamani-geldi.jpg","type":"image\/jpeg"}],"author":"Kader Kele\u015f","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Kader Kele\u015f","Tahmini okuma s\u00fcresi":"2 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#article","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/"},"author":{"name":"Kader Kele\u015f","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a"},"headline":"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131","datePublished":"2023-05-04T20:08:24+00:00","dateModified":"2023-05-04T20:13:00+00:00","mainEntityOfPage":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/"},"wordCount":458,"commentCount":0,"publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"keywords":["duvar\u0131","g\u00fcvenlik","i\u00e7in","linux","sunucu","yap\u0131land\u0131rmas\u0131","y\u00f6netimi"],"articleSection":["Linux"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/","url":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/","name":"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131 - Cesrey Web Hosting Blog","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/#website"},"datePublished":"2023-05-04T20:08:24+00:00","dateModified":"2023-05-04T20:13:00+00:00","breadcrumb":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-sunucu-yonetimi-icin-guvenlik-duvari-yapilandirmasi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/cesrey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux Sunucu Y\u00f6netimi i\u00e7in G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131"}]},{"@type":"WebSite","@id":"https:\/\/cesrey.com\/blog\/#website","url":"https:\/\/cesrey.com\/blog\/","name":"Cesrey Web Hosting Blog","description":"","publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cesrey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/cesrey.com\/blog\/#organization","name":"Cesrey Web Hosting Blog","url":"https:\/\/cesrey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","contentUrl":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","width":1470,"height":391,"caption":"Cesrey Web Hosting Blog"},"image":{"@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a","name":"Kader Kele\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","caption":"Kader Kele\u015f"},"url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/"}]}},"_links":{"self":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/comments?post=859"}],"version-history":[{"count":1,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/859\/revisions"}],"predecessor-version":[{"id":869,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/859\/revisions\/869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media\/546"}],"wp:attachment":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media?parent=859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/categories?post=859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/tags?post=859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}