1. dnf安装ssh
dnf -y install ssh
2. 启动ssh
service sshd start
3.开机自动运行启动
chkconfig sshd on
4.ssh文件配置
[root@linux234 ~]# vi /etc/ssh/sshd_config ← 用vi打开SSH的配置文件
#Protocol 2,1 ← 找到此行将行头“#”删除,再将行末的“,1”删除,只允许SSH2方式的连接
↓
Protocol 2 ← 修改后变为此状态,仅使用SSH2
#ServerKeyBits 768 ← 找到这一行,将行首的“#”去掉,并将768改为1024 Centos 6.8默认已经是1024了
↓
ServerKeyBits 1024 ← 修改后变为此状态,将ServerKey强度改为1024比特
#PermitRootLogin yes ← 找到这一行,将行首的“#”去掉,并将yes改为no
↓
PermitRootLogin no ← 修改后变为此状态,不允许用root进行登录
#PasswordAuthentication yes ← 找到这一行,将yes改为no
↓
PasswordAuthentication no ← 修改后变为此状态,不允许密码方式的登录
#PermitEmptyPasswords no ← 找到此行将行头的“#”删除,不允许空密码登录
↓
PermitEmptyPasswords no ← 修改后变为此状态,禁止空密码进行登录
然后保存并退出。(vi保存退出的命令为ZZ 或按下ESC 在: 就是冒号。[root@linux234 ~]#:wq! )
安全方面
启用内网网段可访问 禁止其他
[root@linux234 ~]# vi /etc/hosts.deny ← 修改屏蔽规则,在文尾添加相应行
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the ‘/usr/sbin/tcpd’ server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
sshd: ALL ← 添加这一行,屏蔽来自所有的SSH连接请求
[root@linux234 ~]# vi /etc/hosts.allow ← 修改允许规则,在文尾添加相应行
#
# hosts.allow This file describes the names of the hosts which are
# allowed to use the local INET services, as decided
# by the ‘/usr/sbin/tcpd’ server.
#
sshd: 192.168.0. ← 添加这一行,只允许来自内网的SSH连接请求
或指定一个IP,多个IP用逗号分开
重新启动SSH
service sshd restart 或/etc/init.d/ssh restart
[root@linux234 ~]#service sshd restart
Stopping sshd: [ OK ]
Starting sshd: [ OK ] ← SSH服务器重新启动成功
登录服务器
1.Linux客户机
# ssh IP地址 //输入服务器IP登录,不加用户名默认以root身份登录
或者
# ssh yonghu1@IP //以yonghu1身份登入服务器
ssh -p 端口 yonghu1@IP
centos 6.8 ssh安装及配置