How to remotely manage RHEL5 through SSH

Source: Internet
Author: User
Article Title: How to remotely manage rhel5. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.

Linux provides multiple methods for users to perform remote management, such as Telnet. Its basic application is to provide remote management and share resources in the remote system. Telnet enables the user to sit in front of his computer and access another computer through the network, and each character entered by the user is transmitted to the host. Then, each information output by the host is displayed on the screen. Such a connection may occur in the same room or at both ends of the earth. However, the Telnet service is inherently insecure because it uses plain text to transmit data throughout the entire Telnet communication process. In today's network environment, such an operation is tantamount to suicide if it is found on the Internet.

SSH (Secure Shell) is different. It is a safer solution for remotely operating servers through online services. It was initially developed by a Finnish company, but due to copyright issues, currently, most of them are replaced by OpenSSH. It can encrypt all transmitted data so that the man-in-the-middle function is unlikely to succeed. In addition, SSH compresses data during data transmission, which can speed up data transmission. In short, SSH is very good and powerful, and is gradually replacing Telnet, becoming the main choice for remote login.

SSH works in the same way as Telnet Client/Server. Currently, there are two major incompatible versions: 1.x and 2.x. OpenSSH 2.x supports both 1.x and 2.x.

The following uses RHEL 5 as an example to describe the application of the SSH service in remote Logon:

By default, SSH has been installed and enabled in RHEL 5, but it is recommended to check whether the process and port work properly before use.

During the experiment, the user will remotely log on to golf. example. zqin through SSH on football. example. zqin. Before describing the configuration process, we will first introduce several common commands used in SSH:
Ssh [user @] hostname [command]

Remotely connect to the specified server

◆ [User @]: the user name of the remote computer. If this parameter is left blank, the root user is used for connection.

◆ [Command]: The command directly executed after the connection is successful

Scp [user @] host:/path [-rpC]

File copying between the ssh client and the server

◆-R: Recursion

◆-P: retain original File Permissions

◆-C: compressed data during transmission

Rsync srcfile host:/path

To synchronize files between the client and the server, this command is one-time. If you need to regularly execute the command, use crontab. In synchronization, it is only from srcfile TO host:/path.

[1] [2] [3] Next page

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.