© David Both 2020
D. BothUsing and Administering Linux: Volume 3https://doi.org/10.1007/978-1-4842-5485-1_5

5. Remote Access with SSH

David Both1 
(1)
Raleigh, NC, USA
 

Objectives

In this chapter you will learn:
  • How SSH works to create and maintain secure connections.

  • Advanced SSH usage and techniques.

  • How to use SSH for secure file transfers.

  • How to use SSH to perform remote command execution.

  • How to generate and use Public/Private Key Pairs (PPKP) for authentication.

  • To use X-forwarding to run GUI programs on the remote host so that the windows of their GUI interface are displayed on the local host.

  • An easy and elegant way to perform a centralized backup of remote hosts.

Introduction

We looked at using Secure Shell (SSH) in Volume 2, Chapter 17, of this course. ...

Get Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.