Linux basics-network configuration, host name setting, ssh Login, scp transmission, sshscp
1. Network Configuration Modification
1. Temporary modification (ip, dns, netmask, gateway)
Temporarily modify the network configuration. If the configuration file is not modified, all the settings will become invalid after the network service is restarted.
2. Permanent modification (ip, dns, netmask, gateway)
Modify the network profile ifcfg-ens33, which takes effect permanently after being saved
Ii. Host Name and domain name settings for machines in the Cluster
Iii. ssh Login
SSH, short for Secure Shell, is developed by the Network Working Group of IETF. SSH is a security protocol based on the application layer. SSH is a reliable protocol designed for remote logon sessions and other network services. The SSH protocol can effectively prevent information leakage during Remote Management. SSH was originally a program on a UNIX system and then quickly extended to other operating platforms. SSH can compensate for Network Vulnerabilities when used correctly. The SSH client is applicable to multiple platforms. Almost all UNIX platforms-including HP-UX, Linux, AIX, Solaris, Digital UNIX, Irix, and other platforms-can run SSH.
For normal ssh Login, you need to enter the host password each time. To facilitate frequent login, you can generate a key for the client and service machine to log on without password.
Iv. scp File Transfer
5. Modify the default port of the ssh service and verify the access
References
1. http://baike.baidu.com/link? Url = Q97HqQhV4pt8GOrSnik87-SYTlkE-ULnFz5U3j4HMX0lTHwI0NO3Zy2BEsBQjuEaGbhD7b35kzd1jJ5CSavMK