I. Network configuration modifications
1. Temporary modification (Ip,dns,netmask,gateway)
Temporarily modify the network configuration, as long as it does not involve the modification of the configuration file, after the network service restarts, all settings expire
2. Permanent modification (Ip,dns,netmask,gateway)
Modify the network configuration file "Ifcfg-ens33" and save it for permanent effect
Two. machine hostname and domain name setting in the cluster
Three. SSH Login
SSH is the abbreviation for secure Shell, which is developed by the IETF Network Working Group, and SSH is a security protocol based on the application layer. SSH is currently a more reliable protocol that provides security for Telnet sessions and other network services. The use of SSH protocol can effectively prevent the information leakage in the remote management process. SSH was originally a program on a UNIX system, and later expanded quickly to other operating platforms. SSH can compensate for vulnerabilities in the network when it is used correctly. The SSH client is available on a variety of platforms. Almost all UNIX platforms-including HP-UX, Linux, AIX, Solaris, Digital UNIX, Irix, and other platforms-can run SSH.
Normal SSH login need to enter the host password each time, in order to facilitate frequent landing, you can generate a key for the client machine and server to avoid the secret login
Four. SCP Transfer file
Five. Modify the SSH service default port and verify Access
Resources
1. Http://baike.baidu.com/link?url=Q97HqQhV4pt8GOrSnik87_-SYTlkE-ULnFz5U3j4HMX0lTHwI0NO3Zy2BEsBQjuEaGbhD7b35kzd1jJ5CSavMK
Linux Basics-Network configuration, hostname settings, SSH login, SCP transfer