0% found this document useful (0 votes)
1 views6 pages

3.ssh

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views6 pages

3.ssh

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Red Hat Certified

System
Administrator

Accessing Remote
Systems with SSH
What is SSH?
SSH stands for Secure Shell. The
ssh commmand is used to open a
shell on another system in a secure,
encrypted manner. It’s a
replacement, and more secure
version, of the telnet command.
Common ssh Flags
• -l Used to specify an alternate
username. Can also be done
with ssh user@hostname
• -i filename Used for
specifying what private key is
used to authenticate this
connection
• -F filename Used for
specifying what configuration
file to use. The default is:
~/.ssh/config
SSH Private Keys
ssh connections can be made
without sending a password to be
authenticated. This is done with key
pairs. To help get this method set up
there are some utilities already
written.
• ssh-keygen As its name
implies, this script will generate
your keys.
• ssh-copy-id This script will
copy the public key over to the
target server.
X11 Forwarding
ssh will also allow you to tunnel GUI
programs over an SSH connection to be
displayed on your local machine.

This can be done by running ssh –X


user@server.
Other SSH Commands
Telnet isn't all that got replaced with
SSH. There was also a file copying
utility, rcp. It was replaced with scp.
Another, ftp, also has an ssh
equivalent, sftp.

You might also like