From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Review of SSH

Review of SSH

- Let's cover a quick review of SSH. On the slide here, we have two computers. We have an SSH client. That's where you're sitting and what you use to connect to remote systems. And over here we have an SSH server. This icon is of a actual server, but it could be any computer or switch or what have you. For the labs that we're going to run, my SSH client will be my Debian client system, and the server's going to be my Debian server. Remember that by default, the server needs to have Port 22 inbound open. On the client side, the outbound port is dynamically assigned, so it could be anything, but it's usually higher than 30,000. Previously we used passwords to make the connection between the client and the server, but in the next sub lesson, we're going to show how to use keys to make those connections. And this way we don't have to type the passwords and we can create keys that are as powerful as we need. So the client computer will be my Debian computer here, and we'll make sure that…

Contents