Red Hat System Administration I
With the
sshcommand, users can access remote systems securely with the SSH protocol.A client system stores the identities of remote servers in the
~/.ssh/known_hostsand/etc/ssh/ssh_known_hostsfiles.SSH supports both password-based and key-based authentication.
The
ssh-keygencommand generates an SSH key pair for authentication. Thessh-copy-idcommand exports the public key to remote systems.The
sshdservice implements the SSH protocol on Red Hat Enterprise Linux systems.Configure advanced SSH settings in the
/etc/ssh/sshd_configconfiguration file.It is a recommended practice to configure
sshdto disable remote logins asrootand to require public key authentication rather than password-based authentication.
Lab Controls
Click CREATE to build all of the virtual machines needed for the classroom lab environment. This may take several minutes to complete. Once created the environment can then be stopped and restarted to pause your experience.
If you DELETE your lab, you will remove all of the virtual machines in your classroom and lose all of your progress.