This article will help you connect to your server or desktop using SSH protocol.
We need to know the IP address of the virtual server and the password for the root user. Having obtained the necessary data to connect, you can proceed directly to the process.
SSH (Secure SHell – “secure shell”) is a session-level network protocol that allows you to remotely control the operating system and tunnel TCP connections (for example, to transfer files). Combination of functionality with protocols Telnet and rlogin, but unlike them, encrypt all traffic, including passwords transmitted.
Connect to Remote Server or Desktop via SSH from macOS
Users of macOS or Linux operating systems can use the standard terminal application to connect to the virtual server using the SSH protocol.
- Open Terminal;
- In Terminal, enter a command like: ssh [email protected] (in the place of username, you must specify the name of the account, and in the place of ip.address, the IP address or hostname of your server);
- Press the Enter button;
- If you connect to this device for the first time, a message will warn you that the server key is not cached in the registry. Type “Yes” and press Enter.
- Enter account password. For security reasons, the entered password is not displayed on the screen as symbols.
- To reset an SSH connection, simply enter the “exit” command or close the Terminal completely.
To connect to your virtual server, use the following command (change 126.96.36.199 to the IP address of your virtual server): ssh [email protected]
This is how the process of connecting to a virtual server looks in a Unix or macOS terminal:
The authenticity of host '188.8.131.52 (184.108.40.206)' can't be established.
RSA key fingerprint is e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:e8:.
Are you sure you want to continue connecting (yes / no)? yes
Warning: Permanently added '220.127.116.11' (RSA) to the list of known hosts.
[email protected]'s password: <enter your password for root user>
Read more: Some Ways to Remove Symbolic Links in macOS
Here I will leave for you a small memo about various parameters for the effective use of the SSH protocol, which you can see by typing “ssh” in your “Terminal” window.
usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface]
[-b bind_address] [-c cipher_spec] [-D [bind_address:]port]
[-E log_file] [-e escape_char] [-F configfile] [-I pkcs11]
[-i identity_file] [-J [[email protected]]host[:port]] [-L address]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
[-Q query_option] [-R address] [-S ctl_path] [-W host:port]
[-w local_tun[:remote_tun]] destination [command]
It can be useful for clarity if you encounter unexpected difficulties when working with the terminal.
SSH is very powerful and most importantly a secure way to connect to a remote computer or server. In addition to computers, devices such as routers, switches also support SSH tunneling and they can be managed using the SSH protocol. The use of this protocol is similar in other Unix-like systems and Linux distributions.