How-to

Use Secure Shell (SSH)

SSH (Secure Shell) is a secure replacement for telnet, rlogin, rsh and rcp. It encrypts all traffic, and provides a high level of protection against hacker attacks. Main features of SSH include secure remote logins, terminal emulation, fully integrated secure file transfers, and secure tunneling of X11 traffic. Many University of Minnesota systems require secure telnet and FTP connections.

Install a SSH Client

SSH clients exist for all common architectures and operating systems. Some are free.

Unix/Linux

Windows

Mac OS X

  • Mac OS X comes with OpenSSH pre-installed. Open the Terminal application from inside the Utilities folder, and then type "ssh user@server_name_or_IP_address" to get started.
  • Portable OpenSSH is available at http://www.openssh.com/portable.html at no charge. The portable OpenSSH follows development of the official version, but releases are not synchronized. Portable releases are marked with a 'p' (e.g. 2.3.0p1).

Protect Your SSH Client

  • Set a strong password on all accounts.
  • Do not allow root to log in through SSH.
  • Use host based or network firewalls to limit access to specific IP addresses.

More Information

Default Sitewide