Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

SSH remote management

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

I. introduction to SSH

SSH (Shell) is a secure channel protocol, which is mainly used to realize remote login of character interface,

Functions such as remote replication. SSH protocol deals with the data transmission between the two sides of the communication, including the user password entered when the user logs in. Compared with the early applications such as telnet (remote login), rsh (Remote Shell) and rcp (Remote File Copy), SSH protocol provides better security.

II. SSH services and configuration files

The 1.ssh service profile is located in the / etc/ssh/sshd_config directory by default.

Service snooping option

1 Port 22 / / the port number of the monitor is 22

2 Protocol 2 / / using SSH V2 protocol

3 ListenAdderss 0.0.0.0 / / the listening address is all addresses

4 UserDNS no / / prohibit DNS reverse parsing

User login control

1 PermitRootLogin no / / prohibit root users from logging in

2 PermitEmptyPasswords no / / prohibit users from logging in

3 LoginGraceTime 2m / / login authentication time is 2 minutes

4 MaxAuthTries 6 / / maximum number of retries 6

5 AllowUsers steven / / only allow steven users to log in

6 DenyUsers steven / / login user steven is not allowed

Login authentication method

1 PasswordAuthentication yes / / enable key

2 PubkeyAuthentication yes / / enable key authentication

3 AuthorsizedKeysFile .ssh / authorized_keys / / specify the public key database file

3. Use SSH client program

1. Command program ssh remote login

Format: ssh user name @ ip address

* * 2scp remote login

The scp command allows you to copy files to and from a remote host using a SSH secure connection. When using the scp command

In addition to specifying the replication source and destination, you should also specify the target host address, login user, and prompt to verify the password after execution.

Format: scp user name @ destination ip address: / directory

Sftp secure FTP

Through the sftp command, you can use the SSH secure connection to upload and download files with the remote host, using the FTP

Similar login process and interactive environment to facilitate directory resource management

four

1. Create a key pair on the client

Command: sh-keygen

two。 Pair the key to the replicated server

3. Use key pair authentication on the client side

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report