Configuring SSH Remote Connection in Linux
There are different methods that can be used to remotely login to a Linux system. Some of these include the use of
SSH (Secure shell), Telnet,
Virtual Network Computing (VNC) e.t.c. Most of these remote login methods, except SSH, however are insecure as data is sent over the network in plain text over unencrypted channel and hence it is possible to sniff on the sensitive data being transmitted. VNC however, encrypts passwords by the data is sent unencrypted.
Objectives of this Scenario
In this scenario, you are going to learn; - Basic introduction to SSH - Configure SSH and Secure SSH Access - Disallowing root access - Disabling password based authentication - Configuring maximum number of authentication attempts - Selectively allowing users to login - Selectively denying users to login - Chrooting SSH users - Reducing SSH Login Timeout Interval - Configuring SSH user configuration file - SSH Key-based Authentication - Copying Files Over SSH - Using SCP - Using SFTP - SSH Authentication SSH-Agent - Configure SSH Tunneling
- TIME105 MINUTES
- COST10 CRYSTALS