HP UX Operating Systems Configuring and enabling ssh, Source System system1 Target System system2

Page 15

Installation overview 19

Configuring secure shell (ssh) or remote shell before installing products

shell) or ssh (secure shell) utilities. These utilities must run as root on all cluster nodes or remote systems.

You can install products to remote systems using either secure shell (ssh) or remote shell (remsh).Using ssh is the default, and is recommended, to configure a secure shell environment before you install any Veritas product.

This section contains an example on how to set up the ssh password free communication. The example sets up ssh between a source system (system1) that contains the installation directories, and a target system (system2). This procedure also applies to multiple target systems.

Configuring and enabling ssh

The ssh program enables you to log in and execute commands on a remote system. ssh enables encrypted communication and an authentication process between two untrusted hosts over an insecure network.

In this procedure, you must first create a DSA key pair. From the key pair, you must append the public key from the source system to the authorized_keys file on the target system or systems.

Figure 3-1illustrates this procedure.

Figure 3-1

Creating the DSA key pair and appending it to target systems

Source System: system1

Target System: system2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Private

Public

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Key

Key

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

authorized_keys

file

Read the ssh documentation and online manual pages before enabling ssh. For information related to issues regarding ssh configuration contact your operating system support provider.

Visit the OpenSSH website that is located at: http://openssh.org to access online manuals and other resources.

Image 15
Contents HP-UX 11i Unix is a registered trademark of The Open Group Contents Contents This chapter includes the following topics Symantec Product Authentication ServiceProduct overview Component softwareVeritas Storage Foundation Storage Foundation Management ServerAbout this product About Veritas Storage Foundation for Oracle Veritas Storage Foundation for OracleAbout Veritas Storage Foundation for Oracle RAC Storage Foundation Cluster File SystemStorage Foundation for Oracle RAC About Veritas Storage Foundation Cluster File SystemProduct overview Storage Foundation for Oracle RAC Product overview Storage Foundation for Oracle RAC How the discs are organized Contents of the software discs in the media kitDisc directory structure Directory name or file name ContentsInstallation overview Documentation references, before you installPerforming preinstallation checks and configuration Page Source System system1 Target System system2 Configuring and enabling sshSystem output similar to the following is displayed Do not enter a passphrase. Press EnterChange the permissions of this directory, to secure it If the lines are not there, add them and restart ssh Connecting to system2To log out of the ssh session, enter the following command At the sftp prompt, enter the following commandTo quit the Sftp session, enter the following command Enter the root password of system2 at the promptWhere system2 is the name of the target system Repeat this procedure for each target systemEnabling remsh Verify that the disc is mounted Mounting a software discCopying and unzipping the downloaded release # cd /parentdirectory/install Documentation Where to find more informationService and support You can access product documentation in the following waysWhere to find more information Service and support