This document outlines how to utilize RPMs to grant access to the
Steadfast Staff access to your server.
ADDING THE CENTOS-STEADFAST REPOSITORY
You can install an RPM to your system to automatically add the
repository data to the yum configuration.
This article is intended to help you understand what to do when you
receive an email abuse report forwarded to you from Steadfast.
If you have recently received an abuse report regarding an Open SNMP,
NTP or DNS server used for an attack, please see bel...
This document describes how to connect to the Steadfast Networks VPN
server for accessing the Internal Network and IPMI remote server
Access to the VPN is freely available to all customers with a service
that is provides...
In March 2013, the Open DNS Resolver Project  identified many IP
addresses on our network that were of moderate to severe risk of
participating in a DNS amplification attack. This attack queries name
servers for large results using a fake source addr...
In Febuary 2014, the Open NTP Project  identified many addresses on
our network that were of moderate to severe risk of participating in a
NTP amplification attack. This attack queries NTP servers for large
results using a fake source address. This ...
Recently, a large number of DDoS attacks have begun to make use of
unsecured SNMP services running on the Internet. SNMP services have a
default community (authentication name) called "public" which can be
used to return some read-only monitoring statis...
Spamhaus provides a set of managed block lists to assist with
identifying and blocking IP addresses and domain names that are likely
to send out spam or cause malware infections. These lists are
available via the spamhaus.org [https://www.spamhaus.org] w...
There are a few common ways to restrict SSH access to your server but
still allow our technicians to access your server.
CHANGED SSH PORT OR REQUIREMENT TO USE SUDO OR SU
In this case, please do the following:
* Log into the management interface [h...