Pay special attention to security when using vswitches. Next, we will analyze the content of setting up the switch SSH. We will introduce the SSH logon configuration of the H3C S3100 switch for public key and password authentication. We hope to help
SSH is the standard configuration for every Linux computer.With the gradual expansion of Linux devices from computers to mobile phones, peripherals and home appliances, SSH is becoming more and more widespread. Not only is the programmer inseparable
Reprinted from Http://www.ruanyifeng.com/blog/2011/12/ssh_remote_login.htmlSSH principle and application (i): remote loginNanyiDate: December 21, 2011SSH is the standard configuration for every Linux computer.With the gradual expansion of Linux
SSH file transfer protocol is a File Transfer Protocol that is more secure than common FTP. (Reference: http://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol) It works on Secure Shell (SSH) to ensure files are encrypted for transmission.Because of
---restore content starts---Linux and UNIX systems:Ifconfig View IP AddressPing:1Ping 192.168.109.128 Test network connection is healthySSH: TelnetSSH [email protected]SSH User name @ipWho: View current logged in user informationWho-qWhoAmIExit: Log
Telnet Login method in the intranet is not very safe, the use of SSH landing is more secure. Let me show you how to login with SSH.Three major strides:
Create a user.
Configure the Vty user.
Configuring AAA Users
First, create
1, install Xshell (online download)2. Open the software, create a new session, select "Connect", the protocol Select "SSH", host input the IP address of the remote Mac that needs to be accessed, click OK to return to the "session" page after the
I. Preface
I don't need to talk about the benefits of ssh?
In short, the previous rpc command and telnet are all replaced by ssh.
For example, the following common functions:
-Remote Logon
Ssh user@remote.machine
-Remote Execution
Ssh
using ssh+ Password Authentication (basic SSH configuration method)Note: When a user logs on to a switch using SSH, the switch authenticates the user who is logged on by using a passwordgenerate RSA and DSA key pair [H3c]public-key Local create RSA [
① Configuring the console login password The first way to configure authentication (AAA)[Server] AAA (authentication mode)[SERVER-AAA] local-user admin1234 password irreversible-cipher (irreversible password) [email protected] (local user admin1234
Some security tips for SSH in CentOSPreface
I don't need to talk about the benefits of ssh? For example, the previous rpc commands can be replaced by ssh in telnet:
-Remote Logon
ssh user@remote.machine
-Remote Execution
ssh
Login: SSH [hostname]-u user
Enter the password :*****
After login, you can control it like you control your own machine, but there is no visual interface. But now I have used two versions of Linux (SUSE and fc5) that can use tools similar to the
Noun Explanation:SSH, the abbreviation for secure Shell, is a protocol similar to Telnet, and the difference is that SSH encrypts the data during the transmission of the information."Key" key is a way of encrypting data, divided into symmetric key
Article Title: Automatically log on to the remote server in linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
& Nbsp; when viewing freebsd logs, it is inevitable to view the logs in auth. A large number of ssh user names are found in logs. To be honest, these people are boring. even if my user name and password have told him that they cannot log in, why?
The robustness after Oracle RAC is installed is a headache. Oracle previously launched a dedicated raccheck tool for it, which makes it easy for us to use these hard-pressed DBAs. Now, Oracle has launched the license HK on the basis of raccheck.
Configure the SSH service to log on to the Linux server using the certificate
Common authentication methods for logging on to a Linux server through SSH (Secure Shell) include passwords and certificates. From the security perspective, we recommend
Compile Shell scripts in CentOS 6.7 to implement simple stepping stone Functions
1. distribution key (using common Users)
ssh-keygen-tdsa-P''-f~/.ssh/id_dsassh-copy-id-i.ssh/id_dsa.pub172.16.1.7ssh-copy-id-i.ssh/id_dsa.pub172.16.1.82. write
Configure the H3C switch instance and set the Security Policy version.1. You can log on through the WEB and set security policies. Use the source IP address to control WEB login users.2. Use SSH + password authentication (Basic SSH configuration
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.