ssh-remote
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ssh-remote [2007/07/14 10:57] – damir | ssh-remote [2007/08/01 18:00] (current) – damir | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== HowTo connect to servers using SSH ====== | ====== HowTo connect to servers using SSH ====== | ||
- | To connect to server, local or remote, you can use the **ssh** client program. When you start a connection to the server using this program, the two machine involved, encrypt all the network traffic generated, so nobody can spy on your connection and see what you are doing. | + | To connect to server, local or remote, you can use the **ssh** client program. When you start a connection to the server using this program, the two machine involved, encrypt all the network traffic generated, so nobody can spy on your connection and see what you are doing. |
+ | |||
+ | |||
+ | |||
Line 13: | Line 17: | ||
where <name of the server> can be the letteral name of the server or his IP Address. If this is the first time you try to connect to the server, the system present the remote key and ask you to confirm the connection. Just answer **yes** to the question and the remote system will ask for your username and password.\\ | where <name of the server> can be the letteral name of the server or his IP Address. If this is the first time you try to connect to the server, the system present the remote key and ask you to confirm the connection. Just answer **yes** to the question and the remote system will ask for your username and password.\\ | ||
The username parameter is normally inherited from the login you are using in the local system, so you have to insert only your password to access the remote system. | The username parameter is normally inherited from the login you are using in the local system, so you have to insert only your password to access the remote system. | ||
- | <note warning> | ||
- | If you are using the session of another user, to access the remote server, use the **-l < | ||
- | </ | ||
After opening the connection you can work on the server as you where logged on the consolle.\\ | After opening the connection you can work on the server as you where logged on the consolle.\\ | ||
- | |||
< | < | ||
- | Windows users can use [[http:// | + | If you are using the session of another user, to access the remote server, use the **-l < |
+ | \\ | ||
+ | Windows users can use [[http:// | ||
</ | </ | ||
Line 34: | Line 36: | ||
If you use this trick to see the graphical interface of a machine connected on the other side of the planet, check the bandwidth you can use. X connection require a lot of bandwidth. | If you use this trick to see the graphical interface of a machine connected on the other side of the planet, check the bandwidth you can use. X connection require a lot of bandwidth. | ||
</ | </ | ||
+ | |||
===== How Access more than one Server ===== | ===== How Access more than one Server ===== | ||
- | In a perfect world, Firewalls doesn' | + | In a perfect world, Firewalls doesn' |
The simple solution is to connect to the gateway and then, from the gateway, open a ssh connection to the remote server. This can be annoying and difficult if you have to connect to different remote server at the same time.\\ | The simple solution is to connect to the gateway and then, from the gateway, open a ssh connection to the remote server. This can be annoying and difficult if you have to connect to different remote server at the same time.\\ |
ssh-remote.1184403420.txt.gz · Last modified: 2007/07/14 10:57 by damir