one. Remote Management
Unlike personal computers, servers are generally run in the IDG room, so we don't usually have direct access to server hardware, but we control the server through a variety of remote management methods.
1. Common Remote management tool methods:
-RDP (Remote Desktop proticol) protocol, Windows Rd management
-telnet CLI interface for remote management, almost all operating systems have (content plaintext transmission)
-ssh (Secure Shell) CLJ interface for remote management, almost all operating systems have (content encrypted transmission), Unix-like system under the main remote management mode (Linux, BSD, MacOS X)
-RFB (remove framebuffer), graphical remote Management Protocol, VNC (Virtual Network Computing)
Protocols used primarily as a major graphical remote management approach for UNIX-like systems (Linux, BSD, MacOS X)
two. SSH
1.SSH (Secure Shell) is the most common remote CLI Management protocol for Linux, Unix, Mac and other network devices, and SSH uses secret key to encrypt and transmit data to ensure the security of remote management data.
2.SSH2 is now widely used in SSH version
3.SSH protocol using TCP protocol, port number 22
4.openssh is an open source SSH program, most of the Linux version of the Army use OpenSSH as an SSH program
5.SSH is divided into server side and client, SSH server is started by default, run as Resident service
Service sshd Status
6. Command ssh to log in to other main clauses with SSH protocol:
SSH [email protected]
SSH [email protected] Who
7. The first time an SSH connection is established between two hosts, the public key needs to be exchanged for encryption
8.SSH information is saved in the user's home directory under the. SSH hidden folder
three. Other commands that use SSH
1. Command SCP to use SSH for fast, encrypted data transfer between two computers:
SCP Source File Destination Address
SCP Linuxcast.tar [Email protected]:/root/
-R recursive copy (for transferring folders)
-P Preserve file permissions and timestamps when transferring
-C data compression on transfer
2. Command rsync to synchronize files between two computers via SSH protocol
rsync * * [email protected]:/root/
The rsync command is an incremental synchronization method that only copies the changed files (modified, new, deleted)
four. VNC
1.VNC is a common graphical remote management protocol for Linux systems (BSD, MAC, etc.) using the RFB protocol
2.VNC is divided into client and server, VNC service runs on managed servers, other computers connect with VNC client
Use Tigervnc as your own VNC program in 3.CentOS 6/rhel6
Five. VNC SERVER
1. On the managed computer, you need to install, configure, and run the VNC server program.
Yum Install-y tigervnc-server
2. After configuring the VNC service, the configuration file is saved in/etc/sysconfig/vncservers
vncsercers= "1:root 2:ZHANGP"
3. Once configured, VNC requires a separate login password, so each VNC-enabled user needs to create a VNC password:
VNCPASSWD (note should be the user on the profile)
4. After creating a good password, enable VNC service
Service Vncserver Start
You need to clear the firewall rules or add the Allow policy:
Iptables-f
Six. VNC Viewer
1.VNC client programs typically become VNC viewer, with many VNC client options available
The VNC client in 2.centos6/rhel6 is
Tigervnc Yum install-y Tigervnc
Remote management of Linux