Linux一般作为服务器使用,而服务器一般放在机房,你不可能在机房操作你的Linux服务器这时我们就需要远程登录到Linux服务器来管理维护系统。本篇文章重点为大家分享一下Linux远程控制具体方法,有需要的小伙伴可以参考一下。
创新互联建站-专业网站定制、快速模板网站建设、高性价比中卫网站开发、企业建站全套包干低至880元,成熟完善的模板库,直接使用。一站式中卫网站制作公司更省心,省钱,快速模板网站建设找我们,业务覆盖中卫地区。费用合理售后完善,10余年实体公司更值得信赖。
从192.168.10.5这台机登录到192.168.10.16这台机上,可以在192.168.10.16做一些操作,比如拷贝文件。
[root@localhost ~]# cd /tmp
[root@localhost tmp]# ifconfig
ens32: flags=4163 mtu 1500
inet 192.168.10.5 netmask 255.255.255.0 broadcast 192.168.10.255
inet6 fe80::20c:29ff:fe84:eae5 prefixlen 64 scopeid 0x20
ether 00:0c:29:84:ea:e5 txqueuelen 1000 (Ethernet)
RX packets 113798033 bytes 13848840312 (12.8 GiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 89922573 bytes 134234526128 (125.0 GiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73 mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
loop txqueuelen 1 (Local Loopback)
RX packets 168 bytes 14260 (13.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 168 bytes 14260 (13.9 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
[root@localhost tmp]# ls
[root@localhost tmp]# pwd
/tmp
[root@localhost ~]# cd /tmp
[root@localhost tmp]# ifconfig
ens32: flags=4163 mtu 1500
inet 192.168.10.16 netmask 255.255.255.0 broadcast 192.168.10.255
inet6 fe80::20c:29ff:fe62:fcc4 prefixlen 64 scopeid 0x20
ether 00:0c:29:62:fc:c4 txqueuelen 1000 (Ethernet)
RX packets 20886 bytes 7480105 (7.1 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 10471 bytes 7083155 (6.7 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73 mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
loop txqueuelen 1 (Local Loopback)
RX packets 580 bytes 49312 (48.1 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 580 bytes 49312 (48.1 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
[root@localhost tmp]# ls
PHP.gif test timestamp.txt 程序员等级判别.jpg 背锅.gif 重启.jpg
[root@localhost tmp]# pwd
/tmp
[root@localhost tmp]# ssh root@192.168.10.16
root@192.168.10.16's password: Last login: Wed Jun 19 22:12:56 2019 from 192.168.10.5 [root@localhost ~]# ifconfig ens32: flags=4163 mtu 1500 inet 192.168.10.16 netmask 255.255.255.0 broadcast 192.168.10.255 inet6 fe80::20c:29ff:fe62:fcc4 prefixlen 64 scopeid 0x20 ether 00:0c:29:62:fc:c4 txqueuelen 1000 (Ethernet) RX packets 21050 bytes 7495118 (7.1 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 10554 bytes 7095520 (6.7 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73 mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10 loop txqueuelen 1 (Local Loopback) RX packets 580 bytes 49312 (48.1 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 580 bytes 49312 (48.1 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
[root@localhost ~]# cd /tmp
[root@localhost tmp]# ls
PHP.gif test timestamp.txt 程序员等级判别.jpg 背锅.gif 重启.jpg
[root@localhost tmp]# scp 程序员等级判别.jpg root@192.168.10.5:/tmp
The authenticity of host '192.168.10.5 (192.168.10.5)' can't be established. ECDSA key fingerprint is 60:aa:a7:f2:b2:bb:24:d4:31:50:2a:4f:50:82:e0:80. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '192.168.10.5' (ECDSA) to the list of known hosts. root@192.168.10.5's password:
程序员等级判别.jpg 100% 12KB 12.1KB/s 00:00
[root@localhost tmp]# exit #退出远程登录
logout
Connection to 192.168.10.16 closed.
[root@localhost tmp]# ifconfig #确认已经回到192.168.10.5
ens32: flags=4163 mtu 1500
inet 192.168.10.5 netmask 255.255.255.0 broadcast 192.168.10.255
inet6 fe80::20c:29ff:fe84:eae5 prefixlen 64 scopeid 0x20
ether 00:0c:29:84:ea:e5 txqueuelen 1000 (Ethernet)
RX packets 113798588 bytes 13848904758 (12.8 GiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 89923000 bytes 134234574328 (125.0 GiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73 mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
loop txqueuelen 1 (Local Loopback)
RX packets 168 bytes 14260 (13.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 168 bytes 14260 (13.9 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
[root@localhost tmp]# ls
#已经成功从192.168.10.16拷贝文件到192.168.10.5
程序员等级判别.jpg
新闻名称:详解Linux远程控制具体方法
新闻来源:http://www.shufengxianlan.com/qtweb/news42/91642.html
网站建设、网络推广公司-创新互联,是专注品牌与效果的网站制作,网络营销seo公司;服务项目有等
声明:本网站发布的内容(图片、视频和文字)以用户投稿、用户转载内容为主,如果涉及侵权请尽快告知,我们将会在第一时间删除。文章观点不代表本网站立场,如需处理请联系客服。电话:028-86922220;邮箱:631063699@qq.com。内容未经允许不得转载,或转载时需注明来源: 创新互联