当前位置:网站首页>SSH connects to the remote host through the springboard machine
SSH connects to the remote host through the springboard machine
2022-04-23 15:05:00 【Shibao】
There are two ways to choose , Include ProxyJump and ProxyCommand .
ProxyJump It is in the form of port forwarding , The springboard machine is required to support port forwarding .
ProxyCommand It's through SSH Protocol forwarding
In terms of security ,ProxyJump It's higher , Because it's end-to-end encryption , The springboard machine only does forwarding through transmission , Maybe the performance is also good .
Here are two examples , This includes transit through multiple springboards and login with certificates ,Host1 The certificate of the local user has been preset ( This is also the usual way ), By modifying the profile .ssh/config Realization :
Host Host1
HostName 192.168.0.1
Port 22
User yourusername
Host Host2
HostName 192.168.0.2
Port 22
User yourusername
IdentityFile ~/xxx.pem
ProxyJump Host1
Host Host3
HostName 192.168.0.3
Port 22
User yourusername
IdentityFile ~/xxx.pem
ProxyJump Host2
Host Host1
HostName 192.168.0.1
Port 22
User yourusername
Host Host2
HostName 192.168.0.2
Port 22
User yourusername
IdentityFile ~/xxx.pem
ProxyCommand ssh Host1 -W %h:%p
Host Host3
HostName 192.168.0.3
Port 22
User yourusername
IdentityFile ~/xxx.pem
ProxyCommand ssh Host2 -W %h:%p
版权声明
本文为[Shibao]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231408547389.html
边栏推荐
- Difference between like and regexp
- 你還不知道責任鏈模式的使用場景嗎?
- Thread synchronization, life cycle
- LeetCode165-比较版本号-双指针-字符串
- For 22 years, you didn't know the file contained vulnerabilities?
- like和regexp差别
- UML学习_day2
- 8.3 language model and data set
- Svn detailed use tutorial
- Leetcode151 - invert words in string - String - simulation
猜你喜欢
eolink 如何助力遠程辦公
8.2 text preprocessing
How to upload large files quickly?
UML learning_ Day2
Don't you know the usage scenario of the responsibility chain model?
Brute force of DVWA low -- > High
免费在upic中设置OneDrive或Google Drive作为图床
Leetcode153 - find the minimum value in the rotation sort array - array - binary search
Set up an AI team in the game world and start the super parametric multi-agent "chaos fight"
分布式事务Seata介绍
随机推荐
The life cycle of key value in redis module programming
Set up an AI team in the game world and start the super parametric multi-agent "chaos fight"
Explanation and example application of the principle of logistic regression in machine learning
【thymeleaf】处理空值和使用安全操作符
Three uses of kprobe
Borui data and F5 jointly build the full data chain DNA of financial technology from code to user
Do (local scope), initializer, memory conflict, swift pointer, inout, unsafepointer, unsafebitcast, success
Tencent has written a few words, Ali has written them all for a month
The difference between having and where in SQL
like和regexp差别
Leetcode167 - sum of two numbers II - double pointer - bisection - array - Search
Design of digital temperature monitoring and alarm system based on DS18B20 single chip microcomputer [LCD1602 display + Proteus simulation + C program + paper + key setting, etc.]
多语言通信基础 06 go实现grpc的四种数据流模式实现
LeetCode165-比较版本号-双指针-字符串
Reptile exercises (1)
Thread synchronization, life cycle
Will golang share data with fragment append
1-初识Go语言
小红书 timestamp2 (2022/04/22)
Detailed analysis of SQL combat of Niuke database (26-30)