{"id":9559,"date":"2026-05-14T17:53:46","date_gmt":"2026-05-14T14:53:46","guid":{"rendered":"https:\/\/www.hostixo.com\/blog\/ssh-portu-degistirme\/"},"modified":"2026-05-14T17:53:46","modified_gmt":"2026-05-14T14:53:46","slug":"ssh-portu-degistirme","status":"publish","type":"post","link":"https:\/\/www.hostixo.com\/blog\/ssh-portu-degistirme\/","title":{"rendered":"Linux SSH Port De\u011fi\u015ftirme: VPS Ve Dedicated Sunucu G\u00fcvenli\u011fi"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7indekiler \u2714<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u0130\u00e7indekiler Tablosunu A\u00e7\/Kapat\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.hostixo.com\/blog\/ssh-portu-degistirme\/#SSH_Portu_Neden_Degistirilmeli_Guvenlik_Riskleri\" >SSH Portu Neden De\u011fi\u015ftirilmeli? G\u00fcvenlik Riskleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.hostixo.com\/blog\/ssh-portu-degistirme\/#Linuxta_SSH_Portu_Nasil_Degistirilir_Adim_Adim_Kilavuz\" >Linux&#8217;ta SSH Portu Nas\u0131l De\u011fi\u015ftirilir? Ad\u0131m Ad\u0131m K\u0131lavuz<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.hostixo.com\/blog\/ssh-portu-degistirme\/#Yeni_SSH_Portu_ile_Baglanti_Nasil_Kurulur\" >Yeni SSH Portu ile Ba\u011flant\u0131 Nas\u0131l Kurulur?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.hostixo.com\/blog\/ssh-portu-degistirme\/#SSH_Portu_Degistirme_Hakkinda_Bilinmesi_Gerekenler\" >SSH Portu De\u011fi\u015ftirme Hakk\u0131nda Bilinmesi Gerekenler<\/a><\/li><\/ul><\/nav><\/div>\n<p><strong>SSH portu de\u011fi\u015ftirme<\/strong>, Linux sunucunuzun g\u00fcvenli\u011fini art\u0131rmak m\u0131 istiyorsunuz? SSH portunu de\u011fi\u015ftirmek, sunucunuzu botnet sald\u0131r\u0131lar\u0131na ve yetkisiz eri\u015fimlere kar\u015f\u0131 koruman\u0131n en etkili yollar\u0131ndan biridir. Bu makalede, <a href=\"https:\/\/www.hostixo.com\/sunucu\/sanal-sunucu\/\" data-internallinksmanager029f6b8e52c=\"3\" title=\"vps sat\u0131n al\">VPS<\/a>, VDS ve dedicated sunucularda SSH portunu nas\u0131l de\u011fi\u015ftirece\u011finizi ad\u0131m ad\u0131m \u00f6\u011frenecek, g\u00fcvenlik \u00f6nlemlerinizi nas\u0131l g\u00fc\u00e7lendirece\u011finizi ke\u015ffedeceksiniz. \u00c7\u00fcnk\u00fc varsay\u0131lan SSH portu (22) k\u00f6t\u00fc niyetli ki\u015filer taraf\u0131ndan kolayca hedeflenebilir ve bu da sunucunuzun g\u00fcvenli\u011fini riske atabilir.<\/p>\n<div class=\"wa-quick-answer\"><strong>H\u0131zl\u0131 Yan\u0131t:<\/strong> Linux sunucularda SSH portu de\u011fi\u015ftirmek, yetkisiz eri\u015fim giri\u015fimlerini azaltarak sunucu g\u00fcvenli\u011fini art\u0131ran basit ama etkili bir y\u00f6ntemdir. Bu i\u015flem, sunucunun g\u00fcvenlik duvar\u0131 ayarlar\u0131n\u0131n ve SSH yap\u0131land\u0131rma dosyas\u0131n\u0131n d\u00fczenlenmesini i\u00e7erir.<\/div>\n<ul class=\"wa-key-points\">\n<li>SSH portu de\u011fi\u015ftirerek sunucu g\u00fcvenli\u011finizi art\u0131r\u0131n.<\/li>\n<li>VPS, VDS ve dedicated sunucularda port de\u011fi\u015ftirme ad\u0131mlar\u0131n\u0131 \u00f6\u011frenin.<\/li>\n<li>G\u00fcvenlik duvar\u0131 ayarlar\u0131n\u0131z\u0131 yeni porta g\u00f6re yap\u0131land\u0131r\u0131n.<\/li>\n<li>SSH yap\u0131land\u0131rma dosyas\u0131n\u0131 do\u011fru \u015fekilde d\u00fczenleyin.<\/li>\n<li>Olas\u0131 sorunlar\u0131 ve \u00e7\u00f6z\u00fcmlerini ke\u015ffedin.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"SSH_Portu_Neden_Degistirilmeli_Guvenlik_Riskleri\"><\/span>SSH Portu Neden De\u011fi\u015ftirilmeli? G\u00fcvenlik Riskleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SSH (Secure Shell), sunuculara g\u00fcvenli bir \u015fekilde eri\u015fmek i\u00e7in kullan\u0131lan bir protokold\u00fcr. Ancak, varsay\u0131lan port olan 22&#8217;nin yayg\u0131n olarak bilinmesi, otomatik tarama ara\u00e7lar\u0131 ve botnetler taraf\u0131ndan hedef al\u0131nmas\u0131na neden olur. \u00d6rne\u011fin, bir botnet s\u00fcrekli olarak 22 numaral\u0131 port \u00fczerinden deneme yan\u0131lma sald\u0131r\u0131lar\u0131 yaparak sunucunuzun g\u00fcvenli\u011fini a\u015fmaya \u00e7al\u0131\u015fabilir. Bu t\u00fcr sald\u0131r\u0131lar\u0131 engellemek i\u00e7in SSH portunu daha az bilinen bir numarayla de\u011fi\u015ftirmek, sunucunuzu potansiyel tehditlere kar\u015f\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde korur. Unutmay\u0131n, g\u00fcvenlik a\u00e7\u0131klar\u0131 sadece yaz\u0131l\u0131mlarda de\u011fil, ayn\u0131 zamanda yap\u0131land\u0131rma hatalar\u0131nda da ortaya \u00e7\u0131kabilir.<\/p>\n<h3>Port De\u011fi\u015ftirmenin Sald\u0131r\u0131 Y\u00fczeyini Azaltma Y\u00f6ntemi<\/h3>\n<p>SSH portunu de\u011fi\u015ftirerek, sunucunuzun &#8220;sald\u0131r\u0131 y\u00fczeyini&#8221; azaltm\u0131\u015f olursunuz. Bu, k\u00f6t\u00fc niyetli ki\u015filerin sunucunuzu hedef almas\u0131n\u0131 zorla\u015ft\u0131r\u0131r. \u00d6rne\u011fin, standart bir tarama arac\u0131 yaln\u0131zca 22 numaral\u0131 portu kontrol edecektir. Portu de\u011fi\u015ftirdi\u011finizde, bu taramalar sunucunuzu bulamaz ve sald\u0131r\u0131 giri\u015fimleri otomatik olarak engellenmi\u015f olur. Ancak, port de\u011fi\u015ftirmenin tek ba\u015f\u0131na yeterli olmad\u0131\u011f\u0131n\u0131, g\u00fc\u00e7l\u00fc bir parola politikas\u0131 ve d\u00fczenli g\u00fcvenlik g\u00fcncellemeleri ile desteklenmesi gerekti\u011fini unutmay\u0131n.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Linuxta_SSH_Portu_Nasil_Degistirilir_Adim_Adim_Kilavuz\"><\/span>Linux&#8217;ta SSH Portu Nas\u0131l De\u011fi\u015ftirilir? Ad\u0131m Ad\u0131m K\u0131lavuz<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SSH portunu de\u011fi\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 izleyin. Bu ad\u0131mlar, VPS, VDS ve dedicated sunucular\u0131n \u00e7o\u011funda benzerdir. Ancak, sunucu da\u011f\u0131t\u0131m\u0131n\u0131za ve kulland\u0131\u011f\u0131n\u0131z g\u00fcvenlik duvar\u0131 yaz\u0131l\u0131m\u0131na g\u00f6re baz\u0131 farkl\u0131l\u0131klar olabilir. \u0130\u015flemlere ba\u015flamadan \u00f6nce sunucunuzun g\u00fcncel bir yede\u011fini alman\u0131z \u00f6nemlidir.<\/p>\n<ol>\n<li><strong>SSH Yap\u0131land\u0131rma Dosyas\u0131n\u0131 D\u00fczenleyin:<\/strong><br \/>\n  <code>sudo nano \/etc\/ssh\/sshd_config<\/code> komutu ile dosyay\u0131 a\u00e7\u0131n.<\/li>\n<li><strong>Port Direktifini Bulun ve De\u011fi\u015ftirin:<\/strong><br \/>\n  <code>#Port 22<\/code> sat\u0131r\u0131n\u0131 bulun, ba\u015f\u0131ndaki <code>#<\/code> i\u015faretini kald\u0131r\u0131n ve 22 yerine kullanmak istedi\u011finiz port numaras\u0131n\u0131 (\u00f6rne\u011fin, 2222) yaz\u0131n.<\/li>\n<li><strong>G\u00fcvenlik Duvar\u0131 Ayarlar\u0131n\u0131 G\u00fcncelleyin:<\/strong><br \/>\n  E\u011fer <code>ufw<\/code> kullan\u0131yorsan\u0131z, <code>sudo ufw allow 2222<\/code> komutu ile yeni portu izin verin ve <code>sudo ufw delete allow ssh<\/code> komutu ile eski portu engelleyin.<\/li>\n<li><strong>SSH Servisini Yeniden Ba\u015flat\u0131n:<\/strong><br \/>\n  <code>sudo systemctl restart sshd<\/code> komutu ile SSH servisini yeniden ba\u015flat\u0131n.<\/li>\n<\/ol>\n<h3>\u00d6rnek Senaryo: UFW G\u00fcvenlik Duvar\u0131 ile Port De\u011fi\u015ftirme<\/h3>\n<p>Diyelim ki sunucunuzda UFW (Uncomplicated Firewall) kullan\u0131yorsunuz ve SSH portunu 22&#8217;den 2222&#8217;ye de\u011fi\u015ftirmek istiyorsunuz. \u0130lk olarak, SSH yap\u0131land\u0131rma dosyas\u0131n\u0131 d\u00fczenleyerek port numaras\u0131n\u0131 de\u011fi\u015ftirin. Ard\u0131ndan, UFW g\u00fcvenlik duvar\u0131nda 2222 numaral\u0131 porta izin vermeniz ve 22 numaral\u0131 portu engellemeniz gerekir. Bu i\u015flemi a\u015fa\u011f\u0131daki komutlarla ger\u00e7ekle\u015ftirebilirsiniz:<\/p>\n<pre><code>sudo ufw allow 2222\nsudo ufw delete allow ssh\nsudo ufw enable<\/code><\/pre>\n<p>Bu komutlar, UFW&#8217;nin 2222 numaral\u0131 port \u00fczerinden gelen SSH trafi\u011fine izin vermesini ve varsay\u0131lan SSH portu olan 22&#8217;yi engellemesini sa\u011flar. Son olarak, SSH servisini yeniden ba\u015flatarak de\u011fi\u015fikliklerin etkinle\u015fmesini sa\u011flay\u0131n.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Yeni_SSH_Portu_ile_Baglanti_Nasil_Kurulur\"><\/span>Yeni SSH Portu ile Ba\u011flant\u0131 Nas\u0131l Kurulur?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SSH portunu de\u011fi\u015ftirdikten sonra, sunucunuza ba\u011flan\u0131rken yeni port numaras\u0131n\u0131 belirtmeniz gerekir. \u00d6rne\u011fin, terminalde a\u015fa\u011f\u0131daki komutu kullanarak ba\u011flanabilirsiniz:<\/p>\n<pre><code>ssh kullaniciadi@sunucu_adresi -p 2222<\/code><\/pre>\n<p>Burada <code>-p<\/code> parametresi, SSH&#8217;nin hangi port \u00fczerinden ba\u011flant\u0131 kuraca\u011f\u0131n\u0131 belirtir. E\u011fer port numaras\u0131n\u0131 belirtmezseniz, SSH varsay\u0131lan olarak 22 numaral\u0131 portu kullanmaya \u00e7al\u0131\u015f\u0131r ve ba\u011flant\u0131 ba\u015far\u0131s\u0131z olur. Ayr\u0131ca, PuTTY gibi GUI tabanl\u0131 SSH istemcilerinde de port numaras\u0131n\u0131 belirtmeniz gerekti\u011fini unutmay\u0131n.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSH_Portu_Degistirme_Hakkinda_Bilinmesi_Gerekenler\"><\/span>SSH Portu De\u011fi\u015ftirme Hakk\u0131nda Bilinmesi Gerekenler<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SSH portunu de\u011fi\u015ftirmek, sunucu g\u00fcvenli\u011finizi art\u0131rman\u0131n \u00f6nemli bir ad\u0131m\u0131d\u0131r. Ancak, bu i\u015flemi yaparken dikkatli olman\u0131z ve olas\u0131 sorunlar\u0131 g\u00f6z \u00f6n\u00fcnde bulundurman\u0131z gerekir. \u00d6rne\u011fin, g\u00fcvenlik duvar\u0131 ayarlar\u0131n\u0131z\u0131 do\u011fru \u015fekilde yap\u0131land\u0131rmazsan\u0131z, sunucunuza eri\u015fiminizi kaybedebilirsiniz. Ayr\u0131ca, SSH yap\u0131land\u0131rma dosyas\u0131nda yap\u0131lan hatalar da SSH servisinin ba\u015flamamas\u0131na neden olabilir. Bu nedenle, de\u011fi\u015fiklikleri yapmadan \u00f6nce sunucunuzun yede\u011fini alman\u0131z ve her ad\u0131m\u0131 dikkatlice uygulaman\u0131z \u00f6nemlidir.<\/p>\n<div>\n<div>\n<h3>SSH portu de\u011fi\u015ftirmek ger\u00e7ekten g\u00fcvenli\u011fi art\u0131r\u0131r m\u0131?<\/h3>\n<div>\n<div>\n<p>Evet, SSH portunu de\u011fi\u015ftirmek sunucu g\u00fcvenli\u011fini art\u0131r\u0131r. Varsay\u0131lan port olan 22&#8217;nin yayg\u0131n olarak bilinmesi, otomatik tarama ara\u00e7lar\u0131 ve botnetler taraf\u0131ndan hedef al\u0131nmas\u0131na neden olur. Portu de\u011fi\u015ftirerek bu t\u00fcr sald\u0131r\u0131lar\u0131 engellemek m\u00fcmk\u00fcn olur.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div>\n<h3>Hangi port numaras\u0131n\u0131 kullanmal\u0131y\u0131m?<\/h3>\n<div>\n<div>\n<p>1024&#8217;ten b\u00fcy\u00fck ve 65535&#8217;ten k\u00fc\u00e7\u00fck, kullan\u0131lmayan bir port numaras\u0131 se\u00e7melisiniz. Yayg\u0131n olarak kullan\u0131lan portlardan ka\u00e7\u0131nmak \u00f6nemlidir. \u00d6rne\u011fin, 2222, 3389 veya 8080 gibi numaralar tercih edilebilir.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div>\n<h3>SSH portunu de\u011fi\u015ftirdikten sonra ba\u011flant\u0131 kuramazsam ne yapmal\u0131y\u0131m?<\/h3>\n<div>\n<div>\n<p>\u00d6ncelikle g\u00fcvenlik duvar\u0131 ayarlar\u0131n\u0131z\u0131 kontrol edin. Yeni porta izin verdi\u011finizden ve eski portu engelledi\u011finizden emin olun. Ayr\u0131ca, SSH yap\u0131land\u0131rma dosyas\u0131nda do\u011fru port numaras\u0131n\u0131 yazd\u0131\u011f\u0131n\u0131zdan emin olun. Sorun devam ederse, sunucunuzun konsolundan ba\u011flant\u0131 kurmay\u0131 deneyin.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div>\n<h3>Port de\u011fi\u015ftirmek tek ba\u015f\u0131na yeterli mi?<\/h3>\n<div>\n<div>\n<p>Hay\u0131r, port de\u011fi\u015ftirmek tek ba\u015f\u0131na yeterli de\u011fildir. G\u00fc\u00e7l\u00fc bir parola politikas\u0131 uygulamak, d\u00fczenli g\u00fcvenlik g\u00fcncellemeleri yapmak ve iki fakt\u00f6rl\u00fc kimlik do\u011frulama kullanmak da \u00f6nemlidir. Port de\u011fi\u015ftirmek sadece bir g\u00fcvenlik katman\u0131 ekler.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div>\n<h3>SSH yap\u0131land\u0131rma dosyas\u0131n\u0131 nas\u0131l d\u00fczenlerim?<\/h3>\n<div>\n<div>\n<p><code>sudo nano \/etc\/ssh\/sshd_config<\/code> komutu ile dosyay\u0131 a\u00e7abilirsiniz. Nano, basit bir metin d\u00fczenleyicisidir. Dosyay\u0131 d\u00fczenledikten sonra <code>Ctrl+X<\/code>, <code>Y<\/code> ve <code>Enter<\/code> tu\u015flar\u0131na basarak kaydedebilirsiniz.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div>\n<h3>SSH portunu de\u011fi\u015ftirmek mi, yoksa fail2ban kullanmak m\u0131 daha iyi?<\/h3>\n<div>\n<div>\n<p>\u0130kisi de farkl\u0131 ama\u00e7lara hizmet eder ve birlikte kullan\u0131lmalar\u0131 en iyisidir. Port de\u011fi\u015ftirmek, otomatik tarama sald\u0131r\u0131lar\u0131n\u0131 engellerken, fail2ban deneme yan\u0131lma sald\u0131r\u0131lar\u0131n\u0131 tespit edip engeller. Her ikisi de sunucu g\u00fcvenli\u011finiz i\u00e7in \u00f6nemlidir.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Linux sunucu g\u00fcvenli\u011finizi art\u0131rmak i\u00e7in SSH portunu de\u011fi\u015ftirmek etkili bir y\u00f6ntemdir. Bu yaz\u0131da, VPS ve dedicated sunucularda SSH portunu nas\u0131l de\u011fi\u015ftirece\u011finizi ad\u0131m ad\u0131m \u00f6\u011frenecek ve g\u00fcvenlik \u00f6nlemlerinizi nas\u0131l g\u00fc\u00e7lendirece\u011finizi ke\u015ffedeceksiniz. Hemen okuyun ve sunucunuzu korumaya al\u0131n!<\/p>\n","protected":false},"author":1,"featured_media":9560,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-genel"],"_links":{"self":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/posts\/9559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/comments?post=9559"}],"version-history":[{"count":0,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/posts\/9559\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/media\/9560"}],"wp:attachment":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/media?parent=9559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/categories?post=9559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/tags?post=9559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}