no edit summary
Setting up a computer network is very important, but the Linux system administrator must also perform networking maintenance which includes '''trouble-shooting''', '''repairing network connection issues''' and '''maintaining network security'''. System administrators need to '''protect or "harden" their computer networks from "penetration" from unauthorized computer users'''. Hardening a computer system can range from running an '''IDS''' (Intrusion Detection System) to monitoring and flagging suspicious activity to implementing security policies which could range from running firewalls to setting locked screen savers on workstations.
In this lab, you will learn how to install and configure the SSH service on a VM to allow users to securely access and share data between authorized personnel. In addition, you will learn various methods of running and configuring an ssh server which include: using '''Public Key Authentication''', setting up an '''SSH tunnel''' in order to securely run graphical applications safely among computers in the network, '''disabling root login'''
, and '''changing the default ssh communication port''' to mislead potential penetration testers (also known as "pen-testers" or "hackers"). You will also learn how to setup a firewall using the '''iptables''' command in order to control the flow of packets throughout your computer server.