Chapter 12. Solutions in this chapter:

  • Allowing SSH Connections
  • Maintaining System Time
  • Configuring the Warning Banner
  • Securing User Home Directories
  • Controlling Session Timeouts
  • Logging Options
  • Additional SSH Server Options
  • Debugging SSH
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

Some people fail to realize the real power that SSH brings to the table. Sure you can connect to a remote system, manage that system, and perform other administrative tasks. There is no doubt these abilities are handy to have. The fact that you can do so securely, unlike with telnet or with an unencrypted VNC session, makes it all the more valuable. In all likelihood, many tasks are easier through the GUI. In most cases if you want to perform ...

Get Next Generation SSH2 Implementation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.