X
Collapse
-
How To Enable SSH on Ubuntu 24.04
If you have two PCs at two locations and want to access another to get some files, You can use Secure Shell, also known as SSH. SSH is a cryptographic network protocol that lets you connect to a remote device over an unsecured internet connection. It initiates an encrypted connection between the two devices so that data transmission stays protected from third parties.
Furthermore, SSH prominently aids in remote administration, effortless file transfers, remote command execution, and many more. However, many Ubuntu users are unaware of how to enable SSH on their systems. So, this guide explains how to enable SSH on Ubuntu 24.04 without hassles.
How To Enable SSH on Ubuntu 24.04
Linux administrators commonly use SSH to manage remote servers. Below is the step-by-step method for enabling SSH on Ubuntu 24.04:
The devices you want to connect (i.e., the local and remote machines) must have the SSH utility. The following set of commands will help you proceed further with its installation and configuration parts:
Sudo apt update && sudo apt upgrade -y
Sudo apt install ssh -y
After installation, use the below command to check if the SSH service is active:
sudo systemctl status ssh
If the service status displays Inactive, use the below command to start it:
sudo systemctl start ssh
Moreover, if the Loaded section suggests that ssh.service is disabled (like in the above image), enable it by executing this command:
sudo systemctl enable ssh.service
After successfully enabling the Secure Shell service, let’s configure the system’s firewall to allow the incoming SSH traffic:
sudo ufw status
sudo ufw enable
sudo ufw allow ssh
You are now all set to access the remote system through SSH. First, get the ip address of the remote client using the “ip a” command.
You will get the IP address on the line starting with init. For instance, in this case, it is 127.0.0.1/8.
Finally, execute the below ssh command to initiate the connection between the devices:
ssh user@ip_address
In the above command, you should ideally replace ip_address with the ip address you acquired earlier and the user with the root username. When run appropriately, you can immediately operate the remote host through the command line.
If you want to close/quit the connection, please enter:
exit
A Quick Wrap-up
SSH, a cryptographic protocol, provides a secure way to access a remote host via a local host. It is popular and widely used due to its encryption features. Therefore, this guide briefly demonstrates enabling SSH on Ubuntu 24.04.
You need to install and enable it on the two host devices, configure your firewall to allow the connections, and run the ssh command to initiate the connection. This way, you’ll be able to operate your remote devices with ease.
More...Tags: None
Posting comments is disabled.
Categories
Collapse
Article Tags
Collapse
There are no tags yet.
Latest Articles
Collapse
-
by Kasimba
by german.suarez
Introduction
In today’s fast-paced digital landscape, ensuring the availability and performance of applications is paramount. Modern infrastructures require robust solutions to distribute traffic efficiently and maintain service availability even in the face of server failures. Enter HAProxy, the de facto standard for high-performance load balancing and failover.
This article...-
Channel: Articles
Today, 03:00 PM -
-
by KasimbaArch Linux hasn't had a license for any package sources (such as PKGBUILD files) in the past, which is potentially problematic. Providing a license will preempt that uncertainty.
In RFC 40 we agreed to change all package sources to be licensed under the very liberal 0BSD license. This change will not limit what you can do with package sources. Check out the RFC for more on the rationale and prior discussion.
Before we make this change, we will provide contributors with...-
Channel: Articles
11-19-2024, 09:21 AM -
-
by Kasimba
by George Whittaker
Introduction
In the world of cybersecurity and software development, binary analysis holds a unique place. It is the art of examining compiled programs to understand their functionality, identify vulnerabilities, or debug issues—without access to the original source code. For Linux, which dominates servers, embedded systems, and even personal computing, the skill of binary analysis is...-
Channel: Articles
11-18-2024, 07:10 PM -
-
by KasimbaDebian and Ubuntu are two popular Linux distributions. In this deep dive we will guide you on the key differences between them from perspective of both corporate enterprise and personal productivity or pleasure usage. After reading this blog post you should be in a better position to decide to select Ubuntu or Debian.
Stewardship, Licensing, Community and Cost
Where as Debian is 100% fully committed to free software as defined by the Debian Free Software Guidelines, Ubuntu is created...-
Channel: Articles
11-17-2024, 08:30 PM -
-
by Kasimba
by George Whittaker
Introduction
In the digital age, data loss is a critical concern, and effective backup and recovery systems are vital for any Debian system administrator or user. Debian, known for its stability and suitability in enterprise, server, and personal computing environments, offers a multitude of tools for creating robust backup and recovery solutions. This guide will explore these solutions,...-
Channel: Articles
11-13-2024, 05:30 PM -
-
by Kasimba
by George Whittaker
Introduction
Debian is one of the most trusted and stable Linux distributions, making it a top choice among developers and system administrators. Setting up a powerful development environment on Debian involves installing the right tools, compilers, libraries, and Integrated Development Environments (IDEs) that can support various programming languages and workflows. This guide provides...-
Channel: Articles
11-07-2024, 11:22 PM -