This article will help you connect to your server or desktop using SSH protocol.

We need to know the IP address of the virtual server and the password for the root user. Having obtained the necessary data to connect, you can proceed directly to the process.

SSH (Secure SHell – “secure shell”) is a session-level network protocol that allows you to remotely control the operating system and tunnel TCP connections (for example, to transfer files). Combination of functionality with protocols Telnet and rlogin, but unlike them, encrypt all traffic, including passwords transmitted.

Connect to Remote Server or Desktop via SSH from macOS

Users of macOS or Linux operating systems can use the standard terminal application to connect to the virtual server using the SSH protocol.

  • Open Terminal;
  • In Terminal, enter a command like: ssh username@ip.address (in the place of username, you must specify the name of the account, and in the place of ip.address, the IP address or hostname of your server);
  • Press the Enter button;
  • If you connect to this device for the first time, a message will warn you that the server key is not cached in the registry. Type “Yes” and press Enter.
  • Enter account password. For security reasons, the entered password is not displayed on the screen as symbols.
  • To reset an SSH connection, simply enter the “exit” command or close the Terminal completely.

Example

To connect to your virtual server, use the following command (change 182.127.101.50 to the IP address of your virtual server): ssh root@182.127.101.50

This is how the process of connecting to a virtual server looks in a Unix or macOS terminal:

ssh root@182.127.101.50
The authenticity of host '182.127.101.50 (182.127.101.50)' can't be established.
RSA key fingerprint is e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:.
Are you sure you want to continue connecting (yes / no)? yes
Warning: Permanently added '182.127.101.50' (RSA) to the list of known hosts.
root@182.127.101.50's password: <enter your password for root user>
[root@182.127.101.50~]#

Read more: Some Ways to Remove Symbolic Links in macOS

Here I will leave for you a small memo about various parameters for the effective use of the SSH protocol, which you can see by typing “ssh” in your “Terminal” window.

usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface]

          [-b bind_address] [-c cipher_spec] [-D [bind_address:]port]

          [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11]

          [-i identity_file] [-J [user@]host[:port]] [-L address]

          [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]

          [-Q query_option] [-R address] [-S ctl_path] [-W host:port]

          [-w local_tun[:remote_tun]] destination [command]

It can be useful for clarity if you encounter unexpected difficulties when working with the terminal.

Conclusion

SSH is very powerful and most importantly a secure way to connect to a remote computer or server. In addition to computers, devices such as routers, switches also support SSH tunneling and they can be managed using the SSH protocol. The use of this protocol is similar in other Unix-like systems and Linux distributions.

It’s the best time to ask questions and give us your feedback in comments.

Author

Hi there! My Name is Vincent Lago! My goal is to share insightful reviews, guides, and manuals for people looking to know more about current solutions for Apple hardware and OS. I have years of technological background knowledge including owning a custom iMacs & PCs which was using for different types of business. And now, I want to share my experience with you.

Write A Comment