0% found this document useful (0 votes)
15 views2 pages

1.1 Server-Remote-Overview

The document discusses how to securely configure remote access to Ubuntu servers using SSH. It explains that SSH uses encryption to securely transmit data and authenticate users to access servers via terminal emulation programs. It then lists the steps to configure SSH access which includes installing openssh, configuring networking and firewalls, downloading terminal emulators, setting up public key encryption and disabling password authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

1.1 Server-Remote-Overview

The document discusses how to securely configure remote access to Ubuntu servers using SSH. It explains that SSH uses encryption to securely transmit data and authenticate users to access servers via terminal emulation programs. It then lists the steps to configure SSH access which includes installing openssh, configuring networking and firewalls, downloading terminal emulators, setting up public key encryption and disabling password authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Ubuntu Linux Fundamentals

Ubuntu Server - Configuring Remote Access -


Overview
One thing you’ll want to understand and be able to set up securely is remote access to your
Ubuntu Servers.

In modern computing, it is quite rare that you will have to, or want to manage a server by a
directly connected keyboard and mouse, known as a console connection.

You’ll want to be able to sit at your desk, or at home, or wherever you choose and manage
your server using Secure Shell (SSH).

There are many pieces involved in setting up SSH, but we’ll break it down, so you’ll be able to
handle it like a pro!

SSH
SSH is a network protocol specifically designed to let you securely access servers over a
network connection.

It uses Transmission Control Protocol on port 22 to listen for connections by default.

Traffic, including your credentials, is kept encrypted, so eaves droppers can’t see or tamper
with your data in transit.

Once you authenticate to an SSH service listening on your server, you’ll be able to manage it
using a terminal emulation program from anywhere.

There are several steps in configuring remote access securely.

• Ensure openssh server is installed on your server


• Configure networking on your VirtualBox VM so you can connect
• Configure your ufw firewall
• Download a terminal emulator
• PuTTY for Windows
• iTerm for MAC OS X
• OpenSSH Client for Linux
• Configure Public Key Infrastructure (PKI) encryption
• Generate your keys
• PuTTYgen for Windows
• ssh-keygen for MAC OS X and Linux
• Copy your public keys to your account on the server
• Test public key access
• Disable remote access for the root account
• Disable password authentication for remote access
• Consider installing Fail2ban and possibly changing the listening port number
• Fail2ban will be covered in the Security section
Wow, that sounds like a lot of stuff!
It is quite a bit, but it’s broken down for you, step-by-step.

You’ll understand SSH and be comfortable installing, configuring, and testing it by the end of
this section.

More Information
DigitalOcean guide to Ubuntu 16.04 Server Setup
https://www.digitalocean.com/community/tutorials/initial-server-setup-with-ubuntu-16-04

Ubuntu Documentation SSH


https://help.ubuntu.com/lts/serverguide/openssh-server.html

You might also like