Jumpserver堡垒机V4.2部署与使用
Jumpserver堡垒机V4.2#
安装部署#
操作系统:Centos7.9
配置:4G 4核
systemctl stop firewalld
setenforce 0
curl -sSL https://resource.fit2cloud.com/jumpserver/jumpserver/releases/latest/download/quick_start.sh | bash

jmsctl --help #查看帮助命令使用文档
vim /opt/jumpserver/config/config.txt
jmsctl start #启动
jmsctl restart #重启
jmsctl stop #关闭
访问登录#
地址: http://<JumpServer服务器IP地址>:<服务运行端口>
用户名: admin
密码: ChangeMe
第一次登陆后会提示修改密码


用户管理#
创建用户组


创建用户



用户列表

创建资产#
创建资产节点

资产节点列表

创建主机#
在堡垒机服务器上常见密钥对,将公钥发送给被管理节点
ssh-keygen
ssh-copy-id 192.168.13.111 #发送到k8s-master
ssh-copy-id 192.168.13.112 #发送到k8s-node1
ssh-copy-id 192.168.13.113 #发送到gitlab
sz /root/.ssh/id_rsa #先将私钥存到自己电脑一下


创建模板


资产列表

资产授权#
账号推送#
创建账号推送



账号推送列表

测试
资产授权#

将k8s节点授权给运维团队

将gitlab节点授权给开发团队

资产授权列表

验证测试连接(web)#



jack用户验证登陆



验证测试连接(Xshell)#
创建帐号推送,将所有资产授权给admin用户


验证是否test3推送成功
创建资产授权



用任意机器进行测试
ssh admin@192.168.13.121 -p 2222 #IP为堡垒机服务器的IP
命令过滤#

创建命令组


创建命令过滤


测试

设置资产只允许堡垒机访问#
第一种方法
修改被管理节点(例:gitlab)配置文件
vim /etc/ssh/sshd_config

systemctl restart sshd # 重启使修改有效




第二种方法
通过修改/etc/hosts.deny和/etc/hosts.allow
vim /etc/hosts.allow

vim /etc/hosts.deny

审计台#

【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】凌霞软件回馈社区,博客园 & 1Panel & Halo 联合会员上线
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】博客园社区专享云产品让利特惠,阿里云新客6.5折上折
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· DeepSeek “源神”启动!「GitHub 热点速览」
· 微软正式发布.NET 10 Preview 1:开启下一代开发框架新篇章
· 我与微信审核的“相爱相杀”看个人小程序副业
· C# 集成 DeepSeek 模型实现 AI 私有化(本地部署与 API 调用教程)
· spring官宣接入deepseek,真的太香了~