With the ssh command, users can access remote systems securely with the SSH protocol.
A client system stores the identities of remote servers in the ~/.ssh/known_hosts and /etc/ssh/ssh_known_hosts files.
SSH supports both password-based and key-based authentication.
The ssh-keygen command generates an SSH key pair for authentication. The ssh-copy-id command exports the public key to remote systems.
The sshd service implements the SSH protocol on Red Hat Enterprise Linux systems.
Configure advanced SSH settings in the /etc/ssh/sshd_config configuration file.
It is a recommended practice to configure sshd to disable remote logins as root and to require public key authentication rather than password-based authentication.
Click CREATE to build all of the virtual machines needed for the classroom lab environment. This may take several minutes to complete. Once created the environment can then be stopped and restarted to pause your experience.
If you DELETE your lab, you will remove all of the virtual machines in your classroom and lose all of your progress.