13,420
edits
Changes
no edit summary
=INVESTIGATION 1: CONFIGURING AND ESTABLISHING AN SSH CONNECTION=
# Use your '''c7host''' machine to complete this section
{|width="40%" align="right"
=INVESTIGATION 2: USING SSH AND OTHER SECURE SHELL UTILITIES=
{|width="40%" align="right"
{|width="40%" align="right"
|- valign="top"
=INVESTIGATION 3: SECURING THE SSH CONNECTION=
[[Image:Tunnel.png|thumb|right|600px|You can also use an ssh connection to '''tunnel other types of traffic'''. There could be different reasons for doing this. For example tunneling traffic for an unencrypted application/protocol through ssh can '''increase the security of that application''' (i.e. deceive potential hackers).<br><br>Alternatively you could use it to '''circumvent a firewall that is blocking traffic''' you wish to use but allows ssh traffic to pass through.]]
# For this section, you will still be using your '''centos1''' and '''centos2''' VMs.
'''Answer Part 1 observations / questions in your lab log book.'''
=== Investigation 7Part 2: How do you make Making sshd more secure More Secure ===
{|width="40%" align="right"
|- valign="top"
</ol>
'''Answer the Investigation 7 Part 2 observations / questions in your lab log book.'''
== Completing the lab ==