


A system administrator may manage multiple servers at the same time, and these servers may be placed in different places. It is obviously not the best way to manage them one by one in person. The remote control method should be the most effective.
There are several remote management tools for Linux systems: telnet, ssh, vnc, etc. Among them, ssh is the most commonly used management method, using ciphertext transmission, which is simple and safe.
Secure Shell
The abbreviation is SSH
, formulated by the IETF Network Working Group (Network Working Group
), SSH
is a security protocol created based on the application layer and transport layer, providing a secure transmission and usage environment for the computer's shell
.
Let’s introduce the 7 major uses of SSH.
1. Basic usage
The simplest usage is to enter ssh without parameters and then add the host address, for example:
ssh 192.168.0.116
This form will log in to the host. By default, the current user is used to log in. When connecting for the first time, SSH will confirm the authenticity of the target host. If there is no problem, just enter yes.
If we want to log in to the host with a specified username, there are two methods:
a. Use the -l option
ssh -l alvin 192.168.0.116
b. Use user@hostname format
ssh alvin@192.168.0.116
These two methods, the second one is particularly commonly used.
2. Specify port to log in
The default port number used by SSH is 22. Most modern Linux systems have port 22 open. If you run the ssh program without specifying a port number, it will directly send the request through port 22.
If we don’t want to log in through port 22, then we can use the -p
option to specify the port.
ssh 192.168.0.116 -p 1234
Extended topic: How to change the port number?
Just modify /etc/ssh/ssh_config
and modify the following line:
Port 22
3. Request compression for all data
Use -C
option, all data sent or received via SSH will be compressed and still encrypted.
ssh -C 192.168.0.116
However, this option is more useful when the Internet speed is not very fast. When the Internet speed is fast, using compression will reduce efficiency, so use it according to the situation.
4. Turn on debug mode
For some reasons, we want to trace and debug the SSH connection we established. The -v
option parameter provided by SSH is designed for this. It can see where the problem occurred.
[Alvin.Alvin-computer] ➤ ssh -v pi@192.168.0.116 OpenSSH_7.1p2, OpenSSL 1.0.1g 7 Apr 2014 debug1: Reading configuration data /etc/ssh_config debug1: Connecting to 192.168.0.116 [192.168.0.116] port 22. debug1: Connection established. debug1: key_load_public: No such file or directory debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_7.1 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Raspbian-10+deb9u4 debug1: match: OpenSSH_7.4p1 Raspbian-10+deb9u4 pat OpenSSH* compat 0x04000000 debug1: Authenticating to 192.168.0.116:22 as 'pi' debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received
5. Bind source address
If your client has more than two IP addresses, it is impossible for you to tell which IP is being used to connect to the SSH server. . To solve this situation, we can use the -b
option to specify an IP address. This IP will be used as the source address to establish the connection.
[Alvin.Alvin-computer] ➤ ssh -b 192.168.0.105 pi@192.168.0.116 Linux raspberrypi 4.14.71-v7+ #1145 SMP Fri Sep 21 15:38:35 BST 2018 armv7l The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Sun Feb 24 08:52:29 2019 from 192.168.0.105
6. Remote execution of commands
If we want to execute a command on the target host, our usual approach is to log in to the target host first, execute the command, and then exit. Of course it is possible to do this, but it is more troublesome.
If we just want to execute a command remotely, we can just follow the command directly, as follows:
[Alvin.Alvin-computer] ➤ ssh pi@192.168.0.116 ls -l Desktop Documents Downloads MagPi Music
7. Mount the remote file system
Another one A great SSH-based tool is called sshfs
. sshfs allows you to directly mount the remote host's file system locally. Its usage format is as follows:
sshfs -o idmap=user user@hostname:/home/user ~/Remote
For example:
sshfs -o idmap=user pi@192.168.0.116:/home/pi ~/Pi
For more Linux articles, please visit Linux Tutorial column to study!
The above is the detailed content of 7 SSH command usages under Linux that you don't know. For more information, please follow other related articles on the PHP Chinese website!

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.

The core components of Linux include the kernel, file system, shell and common tools. 1. The kernel manages hardware resources and provides basic services. 2. The file system organizes and stores data. 3. Shell is the interface for users to interact with the system. 4. Common tools help complete daily tasks.

The basic structure of Linux includes the kernel, file system, and shell. 1) Kernel management hardware resources and use uname-r to view the version. 2) The EXT4 file system supports large files and logs and is created using mkfs.ext4. 3) Shell provides command line interaction such as Bash, and lists files using ls-l.

The key steps in Linux system management and maintenance include: 1) Master the basic knowledge, such as file system structure and user management; 2) Carry out system monitoring and resource management, use top, htop and other tools; 3) Use system logs to troubleshoot, use journalctl and other tools; 4) Write automated scripts and task scheduling, use cron tools; 5) implement security management and protection, configure firewalls through iptables; 6) Carry out performance optimization and best practices, adjust kernel parameters and develop good habits.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SublimeText3 Mac version
God-level code editing software (SublimeText3)

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Atom editor mac version download
The most popular open source editor