HP UX Operating Systems manual Enabling remsh, Where system2 is the name of the target system

Page 19

Installation overview 23

Configuring secure shell (ssh) or remote shell before installing products

12When you install from a source system that is also an installation target, also add the local system id_dsa.pub key to the local authorized_keys file. The installation can fail if the installation source system is not authenticated.

To add the local system id_dsa.pub key to the local authorized_keys file, enter the following command:

system1 # cat /.ssh/id_dsa.pub >> /.ssh/authorized_keys

13Run the following commands on the source installation system. If your ssh session has expired or terminated, you can also run these commands to renew the session. These commands bring the private key into the shell environment and make the key globally available to the root user:

system1 # exec /usr/bin/ssh-agent $SHELL system1 # ssh-add

Identity added: //.ssh/id_dsa

This shell-specific step is valid only while the shell is active. You must execute the procedure again if you close the shell during the session.

To verify that you can connect to a target system

1On the source system (system1), enter the following command:

system1 # ssh -l root system2 uname -a

where system2 is the name of the target system.

2The command should execute from the source system (system1) to the target system (system2) without the system requesting a passphrase or password.

3Repeat this procedure for each target system.

Enabling remsh

Remote shell functionality is enabled automatically after installing HP-UX.

Typically, the only requirement to enable remote installations is to modify the

.rhosts file. A separate .rhosts file is in the $HOME directory of each user. You must modify this file for each user who remotely accesses the system using remsh. Each line of the .rhosts file must contain a fully qualified domain name or IP address for each remote system that has access to the local system. For example, if the root user must remotely access system1 from system2, add an entry for system2.companyname.com to the /.rhosts file on system1.

# echo "system2.companyname.com" >> $HOME/.rhosts

Image 19
Contents HP-UX 11i Unix is a registered trademark of The Open Group Contents Contents This chapter includes the following topics Symantec Product Authentication ServiceProduct overview Component softwareStorage Foundation Management Server Veritas Storage FoundationAbout this product About Veritas Storage Foundation for Oracle Veritas Storage Foundation for OracleAbout Veritas Storage Foundation for Oracle RAC Storage Foundation Cluster File SystemStorage Foundation for Oracle RAC About Veritas Storage Foundation Cluster File SystemProduct overview Storage Foundation for Oracle RAC Product overview Storage Foundation for Oracle RAC How the discs are organized Contents of the software discs in the media kitDisc directory structure Directory name or file name ContentsDocumentation references, before you install Installation overviewPerforming preinstallation checks and configuration Page Source System system1 Target System system2 Configuring and enabling sshDo not enter a passphrase. Press Enter System output similar to the following is displayedChange the permissions of this directory, to secure it If the lines are not there, add them and restart ssh Connecting to system2To log out of the ssh session, enter the following command At the sftp prompt, enter the following commandTo quit the Sftp session, enter the following command Enter the root password of system2 at the promptRepeat this procedure for each target system Where system2 is the name of the target systemEnabling remsh Verify that the disc is mounted Mounting a software discCopying and unzipping the downloaded release # cd /parentdirectory/install Documentation Where to find more informationService and support You can access product documentation in the following waysWhere to find more information Service and support