Changes

Jump to: navigation, search

OPS235 Lab 7 - CentOS7

173 bytes removed, 06:56, 5 May 2015
no edit summary
= Setup and Configure Secure Shell Services (ssh) Using Virtual Machines LAB PREPARATION =
==Overview==
== Configuring & Establishing an INVESTIGATION 1: CONFIGURING AND ESTABLISHING AN SSH Connection =CONNECTION=
=== Investigation Part 1: How do you enable Enabling the sshd service. ===
{{Admon/note | Use your c6host computer system | Complete the following steps on your CentOS host.}}
# Make sure your <code>sshd</code> service is running on all 3 of your VM's
'''Answer the Investigation Part 1 observations / questions in your lab log book.'''
=== Investigation Part 2: How do you establish Establishing an ssh connection. ===
{{Admon/note | Use your centos2 VM | Complete this investigation on your centos2 VM.}}
{{Admon/tip | Methods of Authenticating User Identity | In this part of the lab you established an ssh connection to another host using a password to establish your identity. But passwords are not the only or even the best way of authenticating your identity. We can also use Public/Private key encryption. We will be looking at Public Key Authentication in the next investigation}}
'''Answer the Investigation Part 2 observations / questions in your lab log book.'''
=== Investigation Part 3: How do you establish Establishing an ssh connection using Public Key Authentication. ===
{{Admon/note | Use your centos2 VM | Complete this investigation on your centos2 VM.}}
</ol>
'''Answer the Investigation Part 3 observations / questions in your lab log book.'''
== Using INVESTIGATION 2: USING SSH &amp; Other Secure Shell Utilities =AND OTHER SECURE SHELL UTILITIES=
=== Investigation 4Part 1: How do you use scp and sftp. ===
{{Admon/note | Use your centos2 VM | Complete this investigation on your centos2 VM.}}
'''Answer the Investigation 4 Part 1 observations / questions in your lab log book.'''
=== Investigation 5Part 2: How do you use ssh to tunnel X. ===
{{Admon/note | Use your centos2 and centos1 VMs | Complete this investigation on your centos2 and centos1 VMs.}}
# Experiment with running other GUI applications through <code>ssh</code>.
'''Answer the Investigation 5 Part 2 observations / questions in your lab log book.'''
== Further Securing your Secure Shell Connection =INVESTIGATION 3: SECURING THE SSH CONNECTION=
=== Investigation 6: How do you use ssh to tunnel other traffic. ===
13,420
edits

Navigation menu